2. Security

2.1. Authentication, Authorization, and Accounting

This chapter describes authentication, authorization, and accounting (AAA) used to monitor and control network access on routers. Network security is based on a multi-step process. The first step, authentication, validates a user’s credentials. The second step is authorization, which allows the user to access and execute commands at various command levels based on profiles assigned to the user.

Another step, accounting, keeps track of the activity of a user who has accessed the network. The type of accounting information recorded can include a history of the commands executed, the amount of time spent in the session, the services accessed, and the data transfer size during the session. The accounting data can then be used to analyze trends, and also for billing and auditing purposes.

Configure routers to use local, Remote Authentication Dial In User Service (RADIUS), Lightweight Directory Access Protocol (LDAP), or Terminal Access Controller Access Control System Plus (TACACS+) security to validate users who attempt to access the router by console, telnet, SSH, NETCONF, FTP, and more. Select the authentication order, which determines the authentication method to try first, second, third, or fourth.

The router supports the following security features:

  1. Local security can be implemented for authentication and authorization.
  2. LDAP can be implemented for authentication.
  3. RADIUS can be used for authentication, authorization, and accounting.
  4. TACACS+ can be used for authentication, authorization, and accounting.

Figure 1 depicts end user access-requests sent to a RADIUS server. After validating the user names and passwords, the RADIUS server returns an access-accept message to the users on ALA-1 and ALA-2. The user name and password from ALA-3 could not be authenticated, thus access was denied.

Figure 1:  RADIUS Requests and Responses 

2.1.1. Authentication

Authentication validates a user’s credentials when a user attempts to log in.

When a user attempts to log in through the console, FTP, or other methods, the client sends credentials to the router. Based on the received credentials, the router creates and sends an authentication request to a RADIUS, TACACS+, LDAP, or local database. The order in which the router tries different types of AAA servers and local databases is defined by the configured authentication order.

Transactions between the router and a RADIUS or TACACS+ server are authenticated through the use of a shared secret. The secret is never transmitted over the network. TLS can be used for the connection between the router and the LDAP or RADIUS server. User passwords are sent encrypted between the client and the AAA (RADIUS, TACACS+, or LDAP) server which prevents someone snooping on an insecure network to learn password information.

If the AAA server (of the chosen authentication method) does not respond within a specified time, the router issues the access request to the next configured servers of the same authentication method. Each AAA server must be configured identically to guarantee consistent results.

If any AAA server rejects the authentication request, it sends an access reject message to the router. In this case, no access request is issued to any other AAA servers of the chosen authentication method. However, if other authentication methods, such as TACACS+ and/or local, are configured and the option exit-on-reject is not set, then these methods are attempted. If no other authentication methods are configured, or all methods reject the authentication request, then access is denied.

For the AAA server selection, round-robin is used if multiple AAA servers for one particular authentication method are configured. Although, if the first alive server in the list cannot find a user-name, the router does not re-query the next server in the AAA server list for that authentication method and denies the access request. It may get authenticated on the next login attempt if the next selected AAA server has the appropriate user-name. It is recommended that the same user databases are maintained for AAA servers in order to avoid inconsistent behavior.

The user login is successful when the AAA server accepts the authentication request and responds to the router with an access accept message.

Implementing authentication without authorization for the routers does not require the configuration of VSAs (Vendor Specific Attributes) on the RADIUS server. However, users, user access permissions, and command authorization profiles must be configured on each router.

Any combination of these authentication methods can be configured to control network access from a router:

2.1.1.1. Local Authentication

Local authentication uses PKI or user names and passwords as authentication credentials to authenticate login attempts. The authentication credentials are local to each router, not to user profiles.

By default, local authentication is enabled. When one or more of the other security methods are enabled, local authentication is used in case it is configured as first method in the authentication order, or if other authentication methods are configured before local in the authentication order and fail.

Locally, user names, public keys, and password management information can be configured. This is referred to as local authentication.

2.1.1.2. RADIUS Authentication

Remote Authentication Dial-In User Service (RADIUS) is a client/server security protocol and software that enables remote access servers to communicate with a central server to authenticate dial-in users and authorize access to the requested system or service.

RADIUS allows administrators to maintain user profiles in a shared central database and provides better security, allowing a company to set up a policy that can be applied at a single administered network point.

2.1.1.2.1. RADIUS Server Selection

The RADIUS server selection algorithm is used by different applications:

  1. RADIUS operator management
  2. RADIUS authentication for Enhanced Subscriber Management
  3. RADIUS accounting for Enhanced Subscriber Management
  4. RADIUS PE-discovery

In all these applications, up to 5 RADIUS servers pools (per RADIUS policy, if used) can be configured.

The RADIUS server selection algorithm can work in 2 modes, either Direct mode or Round-robin mode.

2.1.1.2.1.1. Direct Mode

The first server is used as the primary server. If this server is unreachable, the next server, based on the server index, of the server pool is used. This continues until either all servers in the pool have been tried or an answer is received.

If a server is unreachable, it will not be used again by the RADIUS application for the next 30 seconds to allow the server to recover from its unreachable state. After 30 seconds the unreachable server is available again for the RADIUS application. If in these 30 seconds the RADIUS application receives a valid response for a previously sent RADIUS packet on that unreachable server, the server will be available for the RADIUS application again, immediately after reception of that response.

2.1.1.2.1.2. Round-Robin Mode

The RADIUS application sends the next RADIUS packet to the next server in the server pool. The same server non-reachability behavior is valid as in the Direct mode.

2.1.1.2.1.3. Server Reachability Detection

A server is reachable, when the operational state UP, when a valid response is received within a timeout period which is configurable by the retry parameter on the RADIUS policy level.

A server is treated as not-reachable, when the operational state down, when the following occurs:

  1. A timeout — If a number of consecutive timeouts are encountered for a specific server. This number is configurable by the retry parameter on RADIUS policy level.
  2. A send failed — If a packet cannot be sent to the RADIUS server because the forwarding path towards the RADIUS server is broken (for example, the route is not available, the is interface shutdown, etc.), then, no retry mechanism is invoked and immediately, the next server in line is used.

A server that is down can only be used again by the RADIUS algorithm after 30 seconds, unless, during these 30 seconds a valid RADIUS reply is received for that server. Then, the server is immediately marked UP again.

The operational state of a server can also be “unknown” if the RADIUS application is not aware of the state of the RADIUS server (for example, if the server was previously down but no requests had been sent to the server, thus, it is not certain yet whether the server is actually reachable).

2.1.1.2.1.4. Application Specific Behavior

2.1.1.2.1.4.1. Operator Management

By default, the server access mode is Direct, but it can be changed into Round-Robin. A health-check function is available for operator management, which can optionally be disabled. The health-check polls the server once every 30 seconds (configurable) with an improbable user name. If the server does not respond to this health-check, it will be marked down.

If the first server in the list cannot find a user, the next server in the RADIUS server list is queried, only when access mode is set to Round-Robin. If multiple RADIUS servers are used and access mode is set to Direct, it is assumed they all have the same user database.

2.1.1.2.1.4.2. RADIUS Authentication

If the first server in the list cannot find a user, the next server in the RADIUS server list is not queried and access is denied. If multiple RADIUS servers are used, it is assumed they all have the same user database.

2.1.1.2.1.4.3. RADIUS Challenge/Response Interactive Authentication

Challenge-response interactive authentication is used for key authentication where the RADIUS server is asking for the valid response to a displayed challenge. The challenge packet includes a challenge to be displayed to the user, such as a unique generated numeric value unlikely ever to be repeated. Typically this is obtained from an external server that knows what type of authenticator is in the possession of the authorized user and can therefore choose a random or non-repeating pseudorandom number of appropriate length.

The user then enters the challenge into his device (or software) and it calculates a response, which the user enters into the client which forwards it to the RADIUS server within an access request. If the response matches the expected response, the RADIUS server allows the user access, otherwise it rejects the response.

RADIUS challenge/response mode is enabled using the CLI interactive-authentication command in the config>system>security>radius context. RADIUS interactive authentication is disabled by default. The option needs to be enabled using CLI.

Enabling interactive authentication under CLI does not mean that the system uses RADIUS challenge/response mode by default. The configured password authentication-order parameter is used. If the authentication-order parameter is local RADIUS, the system will first attempt to login the user using local authentication. If this fails, the system will revert to RADIUS and challenge/response mode. The authentication-order will precede the RADIUS interactive-authentication mode.

Even if the authentication-order is RADIUS local, the standard password prompt is always displayed. The user enters a username and password at this prompt. If RADIUS interactive-authentication is enabled the password does not have to be the correct password since authentication is accomplished using the RADIUS challenge/response method. The user can enter any password. The username and password are sent to the RADIUS server, which responds with a challenge request that is transmitted back to the node by the RADIUS server. Once the user enters the challenge response, the response is authenticated by the RADIUS server to allow node access to the user.

For example, if the system is configured with system security authentication-order set to local RADIUS, at the login prompt the user can enter the username “admin” and the corresponding password. If the password for local authentication does not match, the system falls into RADIUS authentication mode. The system checks the interactive-authentication configuration and if it is enabled it enters into challenge/response mode. It sends the username and password to the RADIUS server, and the server sends the challenge request back to the node and to the user where it appears as a challenge prompt on screen. A challenge received from the RADIUS server typically contains a string and a hardware token that can be used to generate a password on the users’ local personal token generator. For example, the RADIUS server might send the challenge prompt “Enter response for challenge 12345:” to the SR OS. The string “12345” can be entered in the local token generator which generates the appropriate challenge response for the entered string. This challenge response can then be entered on the SR OS prompt for authorization.

Once the user enters the correct challenge response it is authenticated using the RADIUS server. The server authenticates the user and the user gains access to the node.

If session timeout and Idle timeout values are configured on the RADIUS server, these are used to govern the length of time before the SR OS cancels the challenge prompt. If the user is idle longer than the received idle-timeout (seconds) from the RADIUS server, and/or if the user does not press ENTER before the received session-timeout (seconds).

Note:

For SSH only the session-timeout value is used. The SSH stack cannot track character input into the login prompt until the enter key is pressed.

If the idle/session attribute is not available or if the value is set to a very large number, the SR OS uses the smallest value set in “configure system login-control idle-timeout” and the idle/session timeout attribute value to terminate the prompt. If the “login-control idle-timeout” is disabled, the maximum idle-timeout (24-hours) is used for the calculation.

The SR OS displays the log-in attempts/failure per user in the “show system security user user-name” screen. If the RADIUS rejects a challenge response, it counts as a failed login attempt and a new prompt is displayed. The number of failed attempts is limited by the value set for “configure system security password attempt.” An incorrect challenge response results in a failure count against the password attempts.

2.1.1.2.1.4.4. RADIUS Accounting

RADIUS accounting can be used for two purposes:

  1. CLI command accounting
  2. Enhanced Subscriber Management subscriber host accounting

The RADIUS accounting application will try to send all the accounting records of a subscriber host to the same RADIUS server. If that server is down, then the records are sent to the next server, and from that moment on, the RADIUS application uses that server as the destination for accounting records for that subscriber host. Enhanced Subscriber Management applies to the 7750 SR platform.

2.1.1.2.1.4.5. RADIUS PE-Discovery

If the first server in the list cannot find a user, the next server in the RADIUS server list is not queried and access is denied. If multiple RADIUS servers are used, it is assumed they all have the same user database.

The RADIUS PE-discovery application makes use of a 10 second time period instead of the generic 30 seconds and uses a fixed consecutive timeout value of 2 (see Server Reachability Detection).

As long as the Session-Timeout (attribute in the RADIUS user file) is specified, it is used for the polling interval. Otherwise, the configured polling interval will be used (60 seconds by default).

2.1.1.3. TACACS+ Authentication

Terminal Access Controller Access Control System (TACACS) is an authentication protocol that allows a remote access server to forward a user's login password to an authentication server to determine whether access can be allowed to a given system. TACACS is an encryption protocol and therefore less secure than the later Terminal Access Controller Access Control System Plus (TACACS+) and RADIUS protocols.

TACACS+ and RADIUS have largely replaced earlier protocols in the newer or recently updated networks. TACACS+, which uses Transmission Control Protocol (TCP), is popular because TCP is thought to be a more reliable protocol. RADIUS combines authentication and authorization. TACACS+ separates these operations.

2.1.1.4. LDAP Authentication

Lightweight Directory Access Protocol (LDAP) can provide authentication, authorization, accounting (AAA) functionality, and can allow users to access the full virtualized data center and networking devices. SR OS currently supports LDAP provision of a centralized authentication method with public key management. The authentication method is based on SSH public keys or keyboard authentication (username, password).

Administrators can access networking devices with one private key; public keys are usually saved locally on the SSH server. Proper key management is not feasible with locally-saved public keys on network devices or on virtual machines, as this would result in hundreds of public keys distributed on all devices. LDAPv3 provides a centralized key management system that allows for secure creation and distribution of public keys in the network. Public keys can be remotely saved on the LDAP server, which makes key management much easier, as shown in Figure 2.

Figure 2:  Key Management 

The administrator starts an SSH session through an SSH client using their private key. The SSH client for the authentication method sends a signature created with the user’s private key to the router. The router authenticates the signature using the user’s public key and gives access to the user. To access the public key, the router looks up the public key stored on the LDAP server and the public key stored locally. The order in which the public keys are looked up is defined by the authentication order. Communication between the router and the LDAP server should be secured with LDAP over SSL/TLS (LDAPS). After opening successfully a secured connection, LDAP returns a set of public keys that can be used by the router to verify the signature.

LDAP is integrated into the SR OS as an AAA protocol alongside existing AAA protocols, such as RADIUS and TACACS+. The AAA framework provides tools and mechanisms (such as method lists, server groups, and generic attribute lists) that enable an abstract and uniform interface to AAA clients, irrespective of the actual protocol used for communication with the AAA server.

The authentication functions are:

  1. Public key authentication — The client tries to SSH to the SR OS using public keys.
    Public keys can be stored locally or on the LDAP server and retrieved as needed to authenticate the user.
  2. Password authentication — Keyboard interactive
    The LDAP server can be used for user authentication using keyboard interactive, as with simple user name and password authentication.

2.1.1.4.1. LDAP Authentication Process

A client starts an LDAP session by connecting to an LDAP server, called a Directory System Agent (DSA), which–by default–are on TCP port 389 and UDP port 636 for LDAP. The SR OS then sends an operation request to the server, and the server sends responses in return, as shown in Figure 3. With some exceptions, the client does not need to wait for a response before sending the next request, and the server may send the responses in any order. All information is transmitted using Basic Encoding Rules (BER).

In the SR OS, the client can request the following operations:

  1. StartTLS — Uses the LDAPv3 Transport Layer Security (TLS) extension for a secure connection.
  2. Bind — Authenticates and specify the LDAP protocol version.
  3. Search — Searches for and retrieve directory entries.
  4. Unbind — Closes the connection (not the inverse of Bind).
Figure 3:  LDAP Server and SR OS Interaction for Retrieving the Public Key 

The connection between the router as the LDAP client and the LDAP server should be encrypted using TLS, as all credentials between the router and LDAP are transmitted in clear text.

2.1.1.4.2. Authentication Order

SR OS supports local and LDAP public key storage, the order of which is configured using the config>system>security>password>authentication-order command.

Note:

The SR OS sends available authentication methods to the client and supports public key and password authentication. If the client is configured using public-key-authentication then it will use the public key authentication method.

If the client chooses the public key and LDAP is first in authentication order, then the SR OS will try to authenticate using public key retrieval from the LDAP server. If the public key retrieval from LDAP server fails and exit-on-reject was not configured, the SR OS will try the next method (local) in authentication order for the public key. If the next method also fails, a user authentication fail message will be sent to the client.

If the public key retrieval from the LDAP server fails and exit-on-reject is configured, the SR OS will not try the next method in the authentication order. A user authentication fail message will be sent to the client. At this point, the client can be configured to only use public key authentication, or use both public key authentication followed by password authentication. If the client is configured to use password authentication, it will go through the authentication order again, (for example, it will try all the configured methods in the configured authentication-order) as long as exit-on-reject is not configured.

2.1.1.4.2.1. Authentication Order Public Key Detail

There are two keys for public key authentication: a private key stored on the client and a public key stored on the server (local) or AAA server (LDAP). The client uses the private key to create a signature, which only the public key can authenticate. If the signature is authenticated using the public key, then the user is also authenticated and is granted access. SR OS can locally store, using CLI, as many as 32 RSA keys and 32 ECDHA keys for a single user. In total, the SR OS can load a maximum of 128 public keys in a single authentication attempt.

Note:

The client creates a signature using a single private key, but this signature can be authenticated on the SR OS with maximum of 128 public keys in a single try. If all these public keys fail to authenticate, then a failure message will be sent to the client and the number of failed attempts will be incremented.

If the client has another private key, it can create a new signature with this new private key and attempt the authentication one more time, or switch to password authentication.

The following steps outline the procedure where the client attempts to authenticate using a public key and the authentication order is configured as ldap, then local.

Note:

With each increment of failed attempts, the SR OS also checks the limit for lock-out. If the limit is reached, the user is locked out.

  1. The SSH client opens a session and tries to authenticate the user with private-key-1 (creating signature-1 from private-key-1).
  2. The SR OS checks the authentication order.
  3. The SR OS loads public keys for the user, as follows.
    1. If exit-on-reject is not configured, the SR OS loads all public keys from the LDAP server and all public keys from the locally-saved location.
    2. If exit-on-reject is configured, the SR OS only loads all public keys from the LDAP server and not from the locally-saved location.
  4. The SR OS compares received client signature-1 with signature calculated from loaded public keys and attempts to find a match.
    1. If a match is found, the user is authenticated. The procedure ends.
    2. If no match is found, authentication fails and the SSH client is informed. The LDAP server waits for the SSH client’s reaction.
  5. The SSH client reacts in one of several ways.
    1. The connection is closed.
    2. The password authentication method is continued. In this case, on the SR OS, the number of failed authentication attempts is not incremented.
    3. The next public key is continued, as follows.
      1. If it is not 21st received public key, return to step 3.
      2. If it is the 21st received public key, the number of failed authentication attempts is incremented and the connection is closed.

2.1.1.4.3. LDAP Authentication Using a Password

In addition to public key authentication, the SR OS supports password (keyboard) authentication using the LDAP server.

Note:

TLS provides the encryption for password authentication.

In the following example, the client attempts to authenticate using a password and only ldap is configured in the authentication order.

  1. The client uses telnet or SSH to reach the SR OS.
  2. The SR OS retrieves the user name and password (in plain text).
  3. The SR OS performs a bind operation to the LDAP server using the config>system>security>ldap>server>blind-operation command to set the root-dn and password variables.
  4. The SR OS performs a search operation for the username on LDAP server.
    1. If the user name is found, LDAP sends user_distinguished_name to the router.
    2. If the user name is not found, the authentication fails. The attempt and failed attempt counters will be incremented.
  5. The SR OS performs a bind operation to LDAP with user_distinguished_name and the password from step 2.
  6. The LDAP server checks the password.
    1. If the password is correct, the bind operation succeeds. The failed attempt and successful attempt counters are incremented.
    2. If the password is incorrect, bind is unsuccessful and authentication fails. The attempt and failed attempt counters are incremented.
  7. The SR OS sends a message to unbind from the LDAP server.

2.1.1.4.4. Timeout and Retry Configuration for the LDAP Server

The retry value is the maximum number of connection attempts that the SR OS can make to reach the current LDAP server before attempting the next server. For example, if the value is set to the default of 3, the SR OS will try to establish the connection to current server three times before attempting to establish a connection to the next server.

The timeout value is the number of seconds that the SR OS will wait for a response from the server with which it is attempting to establish a connection. If the server does not reply within the specified timeout value, the SR OS increments the retry counter by one. The SR OS attempts to establish the connection to the current server up to the configured retry value before moving to the next configured server.

2.1.1.4.5. TLS Behavior and LDAP

RFC 4511 section 4.14.1 states, “A client requests TLS establishment by transmitting a StartTLS request message to the server” and “The client MUST NOT send any LDAP PDUs at this LDAP message layer following this request until it receives a StartTLS Extended response”. As such, if an LDAP has a TLS profile configured and the TLS is in an operationally down state, no LDAP packets will be transmitted if TLS negotiation has not been completed, including when the TLS profile is shut down.

2.1.1.4.6. LDAP Health Check

The health check for LDAP is configured under config>system>security>password.

The health-check function, which can be disabled, is available for operator management. The health check polls the server at a specified interval (the default is 30 seconds). The SR OS health check attempts to establish a TCP connection to the LDAP server. The TCP connection is closed by an LDAP unbind message.

2.1.1.4.7. LDAP Redundancy and TLS

LDAP supports up to five redundant (backup) servers. Depending on the configuration of timeout and retry values, if an LDAP server is found to be out of service or operationally down, the SR OS will switch to the redundant servers. The SR OS will try the next LDAP server in the server list by choosing the next largest configured server index.

LDAP servers can use the same TLS profile or can have their own TLS profile. Each TLS profile can have a different configuration of trust-anchor, cipher-list and cert-profile. For security reasons, the LDAP server could be in different geographical areas and, as such, each will be assigned its own server certificate and trust anchor. The TLS profile design allows users to mix and match all components.

Redundant LDAP servers are shown in Figure 4.

Figure 4:  LDAP and TLS Redundancy 

2.1.1.5. Password Hashing

SR OS supports two algorithms for user password hashing: bcrypt, which is the default algorithm, and PBKDF2. The PBKDF2 algorithm can use SHA2 (SHA-256) or SHA3 (SHA-512) for hashing.

The algorithm can be configured using the hashing command from the configure>system>security>password context. The configured algorithm hashes all user passwords.

When password hashing is configured, the following sequence of steps occurs at login:

  1. The node checks the stored password and notes its hash algorithm.
  2. The password entered by the user is hashed with the noted algorithm, and the node compares the hash with the stored user password hash.
  3. If the entered and the stored passwords are the same, and if the hash algorithm of the stored user password is different than the hash algorithm of the system password, the user is prompted to enter a new password 2 times to ensure password match. The node stores this new password in the RAM (not in the system configuration file).
    To store the new password in the configuration file, an admin user must perform an admin save command. If the admin save command is not executed, then on the next reboot the hash algorithm of the stored user password might be different than the system hash and the user must go through this process again from step 2.

After an upgrade to a software load that supports PBKDF2, the default password continues to be stored using the bcrypt algorithm. The following example describes the procedure to change the algorithm. In the example, the algorithm is changed to PBKDF2 and “User_name” can be any user.

  1. User_name logs in and runs the hashing command to change the algorithm.
  2. To save the algorithm change, an admin user performs an admin save command.
  3. To store User_name’s password using PBKDF2, the admin user changes User_name’s password.
  4. From this point onward, any new user passwords or changes to existing user passwords are stored using PBKDF2.

2.1.2. Authorization

The SR OS supports local, RADIUS, and TACACS+ authorization to control the actions of specific users. Any combination of these authorization methods can be configured to control actions of specific users:

Local authorization and RADIUS authorization operate by applying a command authorization profile that is associated in configuration with the user. The profiles are configured locally on the router or downloaded using VSAs from a RADIUS server. See Vendor-Specific Attributes (VSAs).

Authorization applies to CLI access as well as NETCONF or gRPC access. See Authorization Profiles for Different Interfaces for more details.

2.1.2.1. Local Authorization

Local authorization uses user profiles and user access information after a user is authenticated. The profiles and user access information specifies the actions the user can and cannot perform.

By default, local authorization is enabled. Local authorization is disabled only when a different remote authorization method is configured, such as TACACS+ or RADIUS authorization and local is removed from the authorization order.

2.1.2.2. RADIUS Authorization

RADIUS authorization grants or denies access permissions for a router. Permissions include the use of FTP, Telnet, SSH (SCP), and console access. When granting Telnet, SSH (SCP) and console access to the router, authorization can be used to limit what CLI commands the user is allowed to issue and which file systems the user is allowed or denied access.

Once a user has been authenticated using RADIUS (or another method), the router can be configured to perform authorization. The RADIUS server can be used to:

  1. Download the user profile to the router.
  2. Send the profile name that the node should apply to the router.

Profiles consist of a suite of commands that the user is allowed or not allowed to execute. When a user issues a command, the authorization server looks at the command and the user information and compares it with the commands in the profile. If the user is authorized to issue the command, the command is executed. If the user is not authorized to issue the command, then the command is not executed.

Profiles must be created on each router and should be identical for consistent results. If the profile is not present, then access is denied.

Table 3 displays the following scenarios:

  1. Remote (RADIUS) authorization cannot be performed if authentication is done locally (on the router).
  2. The reverse scenario is supported if RADIUS authentication is successful and no authorization is configured for the user on the RADIUS server, then local (router) authorization is attempted, if configured in the authorization order.

When authorization is configured and profiles are downloaded to the router from the RADIUS server, the profiles are considered temporary configurations and are not saved when the user session terminates.

Table 3:  Supported Authorization Configurations  

Router

RADIUS Supplied Profile

Router configured user

RADIUS server configured user

TACACS+ server configured user

When using authorization, maintaining a user database on the router is not required. User names can be configured on the RADIUS server. User names are temporary and are not saved in the configuration when the user session terminates. Temporary user login names and their associated passwords are not saved as part of the configuration.

2.1.2.3. TACACS+ Authorization

TACACS+ command authorization operates in one of three ways:

  1. all users who authenticate via TACACS+ can use a single common default command authorization profile that is configured on the SR OS
  2. each command attempted by a user is sent to the TACACS+ server for authorization
  3. operator can configure local profiles and map tacplus priv-lvl based authorization to those profiles (the use-priv-lvl option)

To use a single common default command authorization profile to control command authorization for TACACS+ users, the operator must enable the tacplus use-default-template option and configure the parameters in the user-template tacplus_default to point to a valid local profile. The tacplus authorization command must also be disabled.

If the default template is not being used for TACACS+ authorization and the tacplus authorization command is enabled without the use-priv-lvl, then each CLI command issued by an operator is sent to the TACACS+ server for authorization. The authorization request sent by the SR OS contains the first word of the CLI command as the value for the TACACS+ cmd and all following words become a cmd-arg. Quoted values are expanded so that the quotation marks are stripped off and the enclosed value are seen as one cmd or cmd-arg.

When the use-priv-lvl option is used, the router will map the priv-lvl returned by the TACACS+ server to a local profile as configured under the priv-lvl-map. Command authorization will then use the local profile. If the TACACS+ server does not return a priv-lvl, and the tacplus use-default-template command is enabled, then the router will use the local profile in the user-template tacplus_default for command authorization.

2.1.2.3.1. Examples

Here is a set of examples, where the listed commands are typed in the CLI:

- “show”
- “show router”
- “show port 1/1/1”
- “configure port 1/1/1 description “my port”

This results in the following AVPairs:

cmd=show
 
cmd=show
cmd-arg=router
 
cmd=show
cmd-arg=port
cmd-arg=1/1/1
 
cmd=configure
cmd-arg=port
cmd-arg=1/1/1
cmd-arg=description
cmd-arg=my port
 

For TACACS+ authorization, the SR OS sends the entire CLI context in the cmd and cmd-arg values. Here is a set of examples where the CLI context is different:

- *A:dut-c# configure service
- *A:dut-c>config>service# vprn 555 customer 1 create
- *A:dut-c>config>service>vprn$ shutdown

This results in the following AVPairs:

cmd =configure
cmd-arg=service
 
cmd=configure
cmd-arg=service
cmd-arg=vprn
cmd-arg="555"
cmd-arg=customer
cmd-arg=1
cmd-arg=create
 
cmd=configure
cmd-arg=service
cmd-arg=vprn
cmd-arg="555"
cmd-arg=customer
cmd-arg=1
cmd-arg=create
cmd-arg=shutdown

2.1.2.4. Authorization Profiles for Different Interfaces

Authorization profiles can be configured in any format including classic the CLI and the MD-CLI. Depending on the configuration, a match might be hit.

Each entry in a profile can be formatted for the classic CLI or the MD-CLI. Nokia recommends creating separate profiles for each interface type. For example, a profile for the classic CLI and a different profile for the MD-CLI.

Authorization checks are not performed by default for telemetry data. All configuration and state elements are available to authenticated telemetry subscriptions, with the exception of LI (Lawful Intercept) configuration and state elements, which are authorized separately based on the LI authorization configuration. To control telemetry data authorization, use the classic CLI configure>system>security>managment-interface>output-authorization> telemetry-data command or the MD-CLI configure system security aaa management-interface output-authorization telemetry-data command.

Table 4 shows authorization and match hit based on the entry format configuration. This is true whether authorization is done using local user profiles or using an AAA server like TACACS+ or RADIUS.

Table 4:   Authorization and Match Hit Based on Entry Format 

Profile Entry Format

Classic CLI

MD-CLI

NETCONF

gNMI Set & Get (gRPC)

Classic CLI

Yes

Maybe

Maybe

Maybe

MD-CLI

Maybe

Yes

Yes

Yes

2.1.2.5. Authorization Support

Table 5 lists the authorization support using a local profile or an AAA server.

Table 5:   Authorization Support 

Classic CLI

MD-CLI

NETCONF

gNMI Set & Get (gRPC)

LDAP

TACACS+

Yes

Yes

Yes

Yes

RADIUS

Yes

Yes

Yes

Yes

Local

Yes

Yes

Yes

Yes

2.1.2.5.1. System-Provisioned AAA Command Authorization Profiles

SR OS provides the following built-in (system-provisioned) AAA command authorization profiles, these profiles can be removed or modified.

  1. default
  2. administrative

The built-in profiles are applicable to users using classic CLI or MD-CLI, and contain rules that apply to classic CLI and rules that apply to MD-CLI interfaces in the same profile.

By default, in SR OS, the administrative profile is associated with the built-in user called 'admin'.

In classic CLI, the default profile is automatically assigned to any newly-created user, but the operator can remove the profile from any user and replace it with another profile.

In MD-CLI, a newly-created user is not associated with any profile. The operator can manually associate a user with the default profile if required.

2.1.2.5.2. Authorization Support for Configuration Groups

Authorization for MD-CLI configuration groups is done explicitly by creating an entry for that group configuration in the user’s profile.

For example, to deny access to router interfaces in both the main configuration branch and in the group configuration branch, create an entry for each one:

 entry 10 
     match "configure router interface"
     action deny
 exit
 entry 20 
     match "configure groups group router interface"
     action deny
 exit

Entry 10 prevents the user from viewing, creating, and editing router interfaces in the main configuration branch and from inheriting router interface configurations via configuration groups.

Entry 20 prevents the user from viewing, creating, and editing router interfaces in the groups configuration branch.

2.1.3. Accounting

2.1.3.1. RADIUS Accounting

Accounting can be configured independently from RADIUS authorization and RADIUS authentication.

When enabled, RADIUS accounting sends command line accounting from the router to the RADIUS server on UDP port 1813 or TCP port 2083 with TLS. The server receives accounting requests and returns a response to the router indicating that it has successfully received the request. Each command issued on the router generates a record sent to the RADIUS server. The record identifies the user who issued the command and the timestamp. If no response is received in the time defined in the timeout parameter, the accounting request must be retransmitted until the configured retry count is exhausted. A trap is issued to alert the NMS (or trap receiver) that the server is unresponsive. The router issues the accounting request to the next configured RADIUS server (up to 5).

User passwords and authentication keys of any type are never transmitted as part of the accounting request.

2.1.3.2. TACACS+ Accounting

The OS allows the administrator to configure the type of accounting record packet that is to be sent to the TACACS+ server when specified events occur on the device. The accounting record-type parameter indicates whether TACACS+ accounting start and stop packets be sent or just stop packets be sent. Start/stop messages are only sent for individual commands, not for the session.

When a user logs in to request access to the network using Telnet or SSH, or a user enters a command for which accounting parameters are configured, or a system event occurs, such as a reboot or a configuration file reload, the router checks the configuration to see if TACACS+ accounting is required for the particular event.

If TACACS+ accounting is required, then, depending on the accounting record type specified, sends a start packet to the TACACS+ accounting server which contains information about the event.

The TACACS+ accounting server acknowledges the start packet and records information about the event. When the event ends, the device sends a stop packet. The stop packet is acknowledged by the TACACS+ accounting server.

2.1.3.3. Command Accounting Log Events

In addition to RADIUS and TACACS+ accounting, SR OS supports a set of log events dedicated to command accounting.

Refer to “Service Router Log Events” in the Log Events Guide for the following log events related to command accounting:

  1. cli_user_io
  2. snmp_user_set
  3. cli_config_io
  4. cli_unauth_user_io
  5. cli_unauth_config_io
  6. md_cli_io
  7. md_cli_unauth_io
  8. netconf_auth
  9. netconf_unauth
  10. grpc_auth
  11. grpc_unauth

2.2. Security Controls

Configure routers to use RADIUS, TACACS+, LDAP, and local authentication to validate users requesting access to the network. The order in which authentication is processed among RADIUS, TACACS+, LDAP, and local can be specifically configured. In other words, the authentication order can be configured to process authorization through TACACS+ first, then RADIUS for authentication and accounting. Local access can be specified next in the authentication order in the event that the RADIUS and TACACS+ servers are not operational. The security methods capabilities are listed in Table 6.

Table 6:  Security Methods Capabilities 

Method

Authentication

Authorization

Accounting*

Local

Not supported

TACACS+

RADIUS

LDAP

Not supported

Not supported

* Local commands always perform account logging using the config log command.

2.2.1. When a Server Does Not Respond

A trap is issued if a RADIUS server is unresponsive. An alarm is raised if RADIUS is enabled with at least one RADIUS server and no response is received to either accounting or user access requests from any server.

Periodic checks to determine if the primary server is responsive again are not performed. If a server is down, it will not be contacted for 5 minutes. If a login is attempted after 5 minutes, then the server is contacted again. When a server does not respond with the health check feature enabled, the server’s status is checked every 30 seconds. Health check is enabled by default. When a service response is restored from at least one server, the alarm condition is cleared. Alarms are raised and cleared on Nokia’s Fault Manager or other third party fault management servers.

The servers are accessed in order from lowest to highest specified index (from 1 to 5) for authentication requests until a response from a server is received. A higher indexed server is only queried if no response is received, implying a lower indexed server is not available. If a response from the server is received, no other server is queried.

2.2.2. Access Request Flow

In Figure 5, the authentication process is defined in the config>system>security> password context. The authentication order is determined by specifying the sequence in which authentication is attempted among RADIUS, TACACS+, LDAP, and local. This example uses the authentication order of RADIUS, then TACACS+, and finally, local. An access request is sent to RADIUS server 1. One of two scenarios can occur. If there is no response from the server, the request is passed to the next RADIUS server with the next lowest index (RADIUS server 2) and so on, until the last RADIUS server is attempted (RADIUS server 5). If server 5 does not respond, the request is passed to the TACACS+ server 1. If there is no response from that server, the request is passed to the next TACACS+ server with the next lowest index (TACACS+ server 2) and so on.

If a request is sent to an active RADIUS server and the user name and password is not recognized, access is denied and passed on to the next authentication option, in this case, the TACACS+ server. The process continues until the request is either accepted, denied, or each server is queried. Finally, if the request is denied by the active TACACS+ server, the local parameters are checked for user name and password verification. This is the last chance for the access request to be accepted.

Figure 5:  Security Flow 

2.3. Control and Management Traffic Protection

SR OS routers support an extensive set of configurable mechanisms to protect the CPU from being flooded with control or management traffic.

These protection mechanisms are a set of configurable hardware-based filters, classification, queuing, and rate-limiting functions that drop unwanted traffic before it reaches the control processor.

  1. In-band traffic extracted from the line cards to the CPM:
    1. Line card features:
      1. ACLs filters: IPv4, IPv6, and MAC
      2. Anti-spoofing, uRPF
      3. Distributed CPU protection
    1. CPM features:
      1. CPM Filters: IPv4, IPv6, and MAC
      2. Centralized CPU Protection
      3. Per-peer queues, protocol queues, CPM queues
  2. Out-band and in-band traffic: Management access filters

2.3.1. CPM Filters

CPM filters are hardware-based filters used to restrict traffic from the line cards directed to the control processor. This filtering is performed by the Fast Path (FP) network processor and it uses no resources on the main CPU.

CPM filters filter traffic is extracted from the data plane and sent to the CPM for processing. Packets from all network and access ports are filtered. Packets originating from a management Ethernet port can be filtered using management access filters. See Management Access Filter for more information.

2.3.1.1. CPM Filter Packet Match

Three different CPM filter policies can be configured: ip-filter, ipv6-filter, and mac-filter.

CPM filter packet match rules:

  1. Each CPM filter policy is an ordered list of entries. Entries must be sequenced correctly from the most explicit to the least explicit.
  2. If multiple match criteria are specified in a single CPM filter policy entry, all criteria must be met for the packet to be considered a match against that policy entry (logical AND).
  3. Any match criteria not explicitly defined is ignored during a match.
  4. A CPM filter policy entry defined without any match criteria is inactive.
  5. A CPM filter policy entry with match criteria defined, but no action configured, inherits the default action defined at the cpm-filter level.
  6. The cpm-filter default-action applies to IPv4, IPv6, or MAC CPM filters that are in a no shutdown state.
  7. When mac-filter and ip-filter/ipv6-filter are applied to a specific packet, the mac-filter is applied first.

2.3.1.2. CPM IPv4 and IPv6 Filter Entry Match Criteria

The supported IPv4 and IPv6 match criteria are shown in the following tables.

Table 7 lists the basic Layer 3 match criteria.

Table 7:  Basic Layer 3 Match Criteria  

Criteria

Description

dscp

Matches the specified DSCP value against the DSCP/Traffic Class field in the IPv4 or IPv6 packet header.

src-ip/dst-ip

Matches the specified source/destination IPv4/IPv6 address prefix/mask against the source/destination IPv4/IPv6 address field in the IP packet header. Optionally, operators can match a list of IP addresses defined in filter match-list ip-prefix-list or match-list ipv6-prefix-list. The prefix-list can be defined statically or using the apply-path command to automatically populate using configured BGP peers defined in the base router or VPRN services. Refer to the “Match List for Filter Policies” section in the Router Configuration Guide for more details on filter match-list configuration and capabilities.

fragment

For IPv4, match against the MF bit or Fragment Offset field to determine if the packet is a fragment. For IPv6 match against the next-header field or Fragment Extension Header value to determine whether the packet is a fragment. Up to six extension headers are matched against to find the Fragmentation Extension Header.

Table 8 lists the IPv4 options match criteria.

Table 8:  IPv4 Options Match Criteria  

Criteria

Description

ip-option

Matches the specified option value in the first option of the IPv4 packet. Optionally, operators can configure a mask to be used in a match.

option-present

Matches the presence of IP options in the IPv4 packet. Padding and EOOL are also considered as IP options. Up to six IP options are matched against.

multiple-option

Matches the presence of multiple IP options in the IPv4 packet.

Table 9 lists the IPv6 next-header match criteria.

Table 9:  IPv6 Next-Header Match Criteria  

Criteria

Description

hop-by-hop-opt

Matches for the presence of hop-by-hop options extension header in the IPv6 packet. This match criterion is supported on ingress only. Up to six extension headers are matched against.

Table 10 lists the upper-layer protocol match criteria.

Table 10:  Upper-Layer Protocol Match Criteria  

Criteria

Description

next-header

Matches the specified upper-layer protocol (such as TCP or UDP) against the next-header field of the IPv6 packet header. “*” can be used to specify TCP or UDP upper-layer protocol match (logical OR). Next-header matching also allows matching on the presence of a subset of IPv6 extension headers. See the CLI section for information on which extension header match is supported.

protocol

Matches the specified protocol against the Protocol field in the IPv4 packet header (for example, TCP, UDP, or IGMP) of the outer IPv4. “*” can be used to specify TCP or UDP upper-layer protocol match (logical OR).

icmp-code

Matches the specified value against the Code field of the ICMP/ ICMPv6 header of the packet. This match is supported only for entries that also define protocol/next-header match for ICMP/ICMPv6 protocol.

icmp-type

Matches the specified value against the Type field of the ICMP or ICMPv6 header of the packet. This match is supported only for entries that also define protocol/next-header match for “ICMP” or “ICMPv6” protocol.

src-port/dst-port/port

Matches the specified port value (with or without mask), port list, or port range against the Source Port Number/Destination Port Number of the UDP/TCP packet header. An option to match either source or destination port or both (logical OR) using a single filter policy entry is supported by using a directionless port command. Source/destination match is supported only for entries that also define protocol/next-header match for “TCP”, “UDP” or “TCP or UDP” protocols. A non-initial fragment will not match an entry with non-zero port criteria specified.

tcp-ack/tcp-syn

Matches the presence or absence of the TCP flags in the TCP header of the packet. This match criteria also requires defining the protocol/next-header match as “TCP”.

Table 11 lists the router instance match criteria.

Table 11:  Router Instance Match Criteria  

Criteria

Description

router

Matches the router instance packets that are ingressing from for this filter entry.

2.3.1.3. CPM MAC Filter Entry Match Criteria

The MAC match criteria are evaluated against the Ethernet header of the Ethernet frame.

Table 12 lists the router instance match criteria.

Table 12:  Router Instance Match Criteria  

Criteria

Description

frame-type

The filter matches a specific type of frame format. For example, configuring frame-type ethernet_II matches only Ethernet-II frames.

src-mac

Matches the specified source MAC address frames. Optionally, operators can configure a mask to be used in a match.

dst-mac

Matches the specified destination MAC address frames. Optionally, operators can configure a mask to be used in a match.

etype

Matches the specified Ethernet II frames. The Ethernet type field is a two-byte field used to identify the protocol carried by the Ethernet frame.

ssap

Matches the specified frames with a source access point on the network node designated in the source field of the packet. Optionally, operators can configure a mask to be used in a match.

dsap

Matches the specified frames with a destination access point on the network node designated in the destination field of the packet. Optionally, operators can configure a mask to be used in a match.

cfm-opcode

Matches the specified packet with the specified cfm-opcode.

2.3.1.4. CPM Filter Policy Action

The two main CPM filter actions allow the option to accept or drop traffic.

Optionally, traffic can be sent to a user-configured hardware queue using a CPM filter. Nokia recommends this primarily for temporary debug or attack investigation activities.

2.3.1.5. CPM Filter Policy Statistics and Logging

Refer to the "Filter Policy Logging" and "Filter Policy" sections in the 7450 ESS, 7750 SR, 7950 XRS, and VSR Router Configuration Guide Guide.

2.3.1.6. CPM Filter: Protocols and Ports

Nokia recommends using a strict CPM filter policy allowing traffic from trusted IP subnets for protocols and ports actively used in the router and to explicitly drop other traffic.

Table 13 identifies which ports are used by which applications in the SR OS. The source port and destination port reflect the CPM filter entry configuration for traffic ingressing the router and sent to the CPM.

Table 13:  Protocols and Ports 

Src Port Number

Dst Port Number

IP Protocol

Application

Description

Accessible Out of Band

Accessible in Band

20

TCP

FTP

FTP Server Data. Active FTP Client.

Yes

Yes

21

TCP

FTP

FTP Server Control

Yes

Yes

20

TCP

FTP

FTP Client Data

Yes

Yes

21

TCP

FTP

FTP Client Control

Yes

Yes

22

TCP

SSH, NETCONF

SSH Server, NETCONF Server

Yes

Yes

22

TCP

SSH

SSH Client. Responses for initiated TCP sessions.

Yes

Yes

23

TCP

Telnet

Telnet server

Yes

Yes

49

TCP

TACACS+

TACACS+ client. Responses for initiated sessions.

Yes

Yes

53

UDP

DNS

DNS client

Yes

67

67

UDP

DHCPv4

DHCPv4: Relay agent to server, server to relay agent, and relay agent to relay agent

Yes

68

67

UDP

DHCPv4

DHCPv4: Client to relay agent/server

Yes

67

68

UDP

DHCPv4

DHCPv4: relay agent/server to client

Yes

123

UDP

NTP

NTP server

Yes

Yes

123

UDP

NTP

NTP client

Yes

Yes

161

UDP

SNMP

SNMP server: SET and GET commands

Yes

Yes

179

TCP

BGP

BGP: server terminated TCP sessions

Yes

179

BGP

BGP: client responses for initiated TCP session

Yes

319

UDP

PTP

1588 PTP event

Yes

320

UDP

PTP

1588 PTP general

Yes

389

TCP

LDAP

LDAP client (non TLS)

Yes

Yes

520

UDP

RIP

RIP

Yes

546

547

UDP

DHCPv6

DHCPv6 - Client to Server/Relay Agent

Yes

547

547

UDP

DHCPv6

DHCPv6 - server to relay agent, relay agent to server, and relay agent to relay agent

Yes

639

UDP

PIM

MSDP: multicast source discovery protocol

Yes

636

TCP

LDAPS

LDAP client over TLS

Yes

646

UDP

LDP

LDP Hello adjacency

Yes

646

TCP

LDP

LDP/T-LDP: terminated TCP sessions

Yes

646

TCP

LDP

LDP/T-LDP: responses for initiated TCP sessions

Yes

701

UDP

LMP

Link management protocol

Yes

830

TCP

NETCONF

NETCONF Server

Yes

Yes

ANY

UDP

TWAMP

TWAMP test

Yes

862

TCP

TWAMP

TWAMP control: terminated TCP session

Yes

862, 64364-64373

UDP

TWAMP

TWAMP Light (Reflector)

Yes

862, 64364-64373

UDP

TWAMP

Nokia TWAMP Light Initiator. Non Nokia initiator may use the entire range.

Yes

1025

UDP

MC-LAG-APS-EP-IPsec

Multi Chassis: LAG, APS (Automation Protection Switching), End Point, IPsec (MIMP), AARP

Yes

1491

TCP

SNMP Streaming

SNMP streaming server

Yes

Yes

1645

UDP

RADIUS Proxy

RADIUS proxy authentication

Yes

1646

UDP

RADIUS Proxy

RADIUS proxy accounting

Yes

1647

UDP

RADIUS CoA

RADIUS Dynamic authorization (CoA/DM)

Yes

Yes

1700

UDP

RADIUS CoA

RADIUS Dynamic authorization (CoA/DM)

Yes

Yes

1701

UDP

L2TP

L2TP server

Yes

1812

UDP

RADIUS CoA

RADIUS Dynamic authorization (CoA/DM)

Yes

Yes

1812

UDP

RADIUS

RADIUS authentication

Yes

Yes

1813

UDP

RADIUS

RADIUS accounting

Yes

Yes

2000

UDP

WPP

Web portal authentication protocol

Yes

2083

TCP

RADIUS

RADIUS over TLS

Yes

Yes

2123

UDP

GTP

GTP control plane

Yes

2123

UDP

GTP

GTP control plane

Yes

2152

UDP

GTP

GTP user plane

Yes

2152

UDP

GTP

GTP user plane

Yes

3232

UDP

PIM

PIM MDT

Yes

3503

UDP

OAM

LSP Ping, LSP Trace, VPRN Trace, VPRN Ping

Yes

3868

UDP

DIAMETER

Diameter

Yes

Yes

3784

UDP

BFD

BFD Control 1 hop BFD and BFD over MPLS LSP

Yes

3785

UDP

BFD

BFD echo

Yes

3799

UDP

RADIUS

RADIUS Dynamic Authorization (CoA/DM)

Yes

Yes

4189

TCP

PCEP

Path Computation Element Protocol

Yes

Yes

4739

UDP

NAT

NAT debug

Yes

4784

UDP

BFD

BFD control multi-hop

Yes

4789

UDP

VXLAN Ping

VXLAN ping request

No

Yes

4790

UDP

VXLAN Ping

VXLAN ping response

No

Yes

5000

UDP

Mtrace2

IP Multicast Mtrace2

Yes

5351

UDP

NAT

PCP NAT port mapping protocol

Yes

6068

TCP

ANCP

ANCP - terminated TCP session

Yes

6514

TCP

Syslog

Syslog over TLS

Yes

Yes

6635

UDP

MPLS over UDP

MPLS over UDP OAM

No

Yes

6653

TCP

OpenFlow

OpenFlow - terminated TCP sessions

Yes

6784

UDP

BFD

uBFD

Yes

8805

UDP

PFCP

Packet and forwarding control protocol - Used to install dynamic forwarding state

Yes

33408-33535

UDP

OAM

OAM Traceroute

Yes

45067

TCP

MCS

Multi-chassis synchronization - Terminated TCP Session (mcs, mc-ring, mc-ipsec)

Yes

45067

TCP

MCS

Multi-chassis synchronization - Responses for initiated TCP session (mcs, mc-ring, mc-ipsec)

Yes

49151

UDP

L2TP

L2TP

Yes

57400

TCP

gRPC

gRPC

Yes

64353

UDP

MPLS DM

MPLS Delay Measurement using UDP return object

Yes

N/A

N/A

GRE

GRE

GRE

Yes

N/A

N/A

ICMP

ICMP

ICMP

Yes

Yes

N/A

N/A

IGMP

IGMP

IGMP

Yes

N/A

N/A

OSPF

OSPF

OSPF

Yes

N/A

N/A

PIM

PIM

PIM

Yes

N/A

N/A

RSVP

RSVP

RSVP

Yes

N/A

N/A

VRRP

VRRP, SRRP

VRRP, SRRP

Yes

pki-server-port or 80/8080

any

TCP

PKI

CMPv2 (Certificate Management Protocol v2) client - Responses for initiated TCP session

Yes

pki-server-port

any

TCP

PKI

OCSP (Online Certificate Status Protocol) client - Responses for initiated TCP session

Yes

pki-server-port or 80/8080

any

TCP

PKI

Auto CRL (Certificate Revocation List) update (client) - Responses for initiated TCP session

Yes

Yes

2.3.2. CPM Per-Peer Queuing

Per-peer queuing provides isolation between peers by allocating hardware queues on a per-peer basis for the following TCP-based protocols: BGP, T-LDP, LDP, MSDP, Telnet, and SSH.

This mechanism guarantees fair and non-blocking access to shared CPU resources across all peers. For example, this ensures that an LDP-based DoS attack from a specific peer is mitigated and compartmentalized and not all CPU resources are dedicated to the overwhelming control traffic sent by that specific peer.

The per-peer-queuing command ensures that service levels would not be (or only partially be) impacted in case of an attack towards BGP, T-LDP, LDP, MSDP, Telnet, or SSH. SSH and Telnet supports per-peer queuing when the login-control ttl-security command is enabled.

2.3.3. CPM Queues

CPM queues provides the operator with a tool that is primarily useful for debugging or investigations during an attack. When using the CPM queues, the following recommendations should be considered.

  1. CPM queues can be used for temporary debug or attack investigation activities, in this case packets can be filtered and directed into the queue using the CPM filter.
  2. CPM queues are not recommended for normal operation where the system default handling and isolation of protocols into protocol queues is already carefully balanced. If additional protection is desired, then the use of the Centralized CPU Protection and Distributed CPU Protection (DCP) features is recommended.

2.3.4. Centralized CPU Protection

SR OS CPU protection is a centralized rate-limiting function that operates on the CPM to limit traffic destined to the CPU. The term “centralized CPU protection” is referred to as “CPU protection” in this guide and in the CLI to differentiate it from “Distributed CPU Protection”.

CPU protection provides interface isolation by rate limiting the total amount of traffic extracted to the CPM per port, interface, or SAP in hardware using a combination of limits configurable at the CPU protection system level or as CPU protection policies assigned to access or network interfaces.

The following limits are configurable at the CPU protection system level:

  1. link-specific rate — Applies to the link-specific protocols LACP (Ethernet LAG control) and LMI (ATM, Ethernet and Frame Relay). The rate is a per-link limit (each link in the system will have LACP/LMI packets limited to this rate).
  2. port-overall-rate – Applies to all control traffic, the rate is a per-port limit, each port in the system will have control traffic destined to the CPM limited to this rate.
  3. protocol-protection — Blocks network control traffic for unconfigured protocols.

The following limits are configurable independently for access or network interfaces using a dedicated CPU protection policy:

  1. overall-rate — Applies to all control traffic destined to the CPM (all sources) received on an interface where the policy is applied. This is a per-interface limit. Control traffic received above this rate will be discarded.
  2. per-source-rate — Used to limit the control traffic destined to the CPM from each individual source. This per-source rate is only applied when an object (SAP) is configured with a cpu-protection policy and also with the optional mac-monitoring or ip-src-monitoring keywords. A source is defined as a SAP, Source MAC Address tuple for MAC monitoring and as a SAP, Source IP Address tuple for IP source monitoring. Only certain protocols (as configured under included-protocols in the CPU protection policy) are limited (per source) when the ip-src-monitoring keyword is used.
  3. out-profile-rate – Applies to all control traffic destined to the CPM (all sources) received on an interface where the policy is applied. This is a per-interface limit. Control traffic received above this rate will be marked as discard eligible (such as, out-profile/low-priority/yellow) and is more likely to be discarded if there is contention for CPU resources.

There are two default CPU protection policies for access and network interfaces.

Policy 254:

  1. This is the default policy that is automatically applied to access interfaces
  2. Traffic above 6000 pps is discarded
  3. overall-rate = 6000
  4. per-source-rate = max
  5. out-profile-rate = 6000

Policy 255:

  1. This is the default policy that is automatically applied to network interfaces
  2. Traffic above 3000 pps is marked as discard eligible, but is not discarded unless there is congestion in the queuing towards the CPU
  3. overall-rate = max
  4. per-source-rate = max
  5. out-profile-rate = 3000

A three-color marking mechanism uses a green, yellow, and red marking function. This allows greater flexibility in how traffic limits are implemented. A CLI command within the CPU protection policy called out-profile-rate maps to the boundary between the green (accept) and yellow (mark as discard eligible/low priority) regions. The overall-rate command marks the boundary between the yellow and red (drop) regions point for the associated policy (Figure 6).

Figure 6:  Profile Marking 

If the overall rate is set to 1000 pps and as long as the total traffic that is destined to the CPM and intended to be processed by the CPU is less than or equal to 1000 pps, all traffic will be processed. If the rate exceeds 1000 pps, then protocol traffic is discarded (or marked as discard eligible/low priority in the case of the out-profile-rate) and traffic on the interface is affected.

This rate limit protects all the other interfaces and ensures that a violation from one interface does not affect the rest of the system.

CPU protection is not supported on 7750 SR-1, 7750 SR-1s, 7750 SR-2s, 7750 SR-e, 7750 SR-a, and 7750 VSR.

2.3.4.1. Protocol Protection

Protocol protection allows traffic to be discarded for protocols not configured on the router. This helps mitigate DoS attacks by filtering invalid control traffic before it reaches the CPU. This is a feature of CPU Protection and can be enabled or disabled for the entire system.

When using protocol-protection, the system automatically maintains a per-interface list of configured protocols. For example, if an interface does not have IS-IS configured, then protocol protection will discard any IS-IS packets received on that interface. Other protocols, such as L2TP, are controlled by protocol-protection at the VPRN service level.

Protocols controlled by the protocol-protection mechanism include:

  1. GTP
  2. IGMP
  3. IS-IS
  4. MLD
  5. L2TP control
  6. OSPFv2
  7. OSPFv3
  8. PPPoE
  9. PIM
  10. RIP
  11. PFCP

The following protocols are protected independently from Protocol Protection:

  1. per-peer-queuing protects BGP, LDP, T-LDP, MSDP, Telnet and SSH
  2. BFD control packets are dropped if BFD is not configured on a specific interface

2.3.4.2. CPU Protection Extensions for ETH-CFM

CPU protection supports the ability to explicitly limit the amount of ETH-CFM traffic that arrives at the CPU for processing. ETH-CFM packets that are redirected to the CPU by either a Management Endpoint (MEP) or a Management Intermediate Point (MIP) will be subject to the configured limit of the associated policy. Up to four CPU protection policies may include up to ten individual ETH-CFM-specific entries. The ETH-CFM entries allow the operator to apply a packet-per-second rate limit to the matching combination of level and opcode for ETH-CFM packet that are redirected to the CPU. Any ETH-CFM traffic that is redirected to the CPU by a Management Point (MP) that does not match any entries of the applied policy is still subject to the overall rate limit of the policy itself. Any ETH-CFM packets that are not redirected to the CPU are not subject to this function and are treated as transit data, subject to the applicable QoS policy.

The operator first creates a CPU policy and includes the required ETH-CFM entries. Overlap is allowed for the entries within a policy, first match logic is applied. This means ordering the entries in the proper sequence is important to ensure the proper behavior is achieved. Even though the number of ETH-CFM entries is limited to ten, the entry numbers have a valid range from 1 to 100 to allow for ample space to insert policies between one and other.

Ranges are allowed when configuring the level and the OpCode. Ranges provide the operator a simplified method for configuring multiple combinations. When more than one level or OpCode is configured in this manner the configured rate limit is applied separately to each combination of level and OpCode match criteria. For example, if the levels are configured as listed in Table 14, with a range of five (5) to seven (7) and the OpCode is configured for 3,5 with a rate of 1. That restricts all possible combinations on that single entry to a rate of 1 packet-per-second. In this example, six different match conditions are created.

Table 14:  Ranges versus Levels and OpCodes 

Level

OpCode

Rate

5

3

1

5

5

1

6

3

1

6

5

1

7

3

1

7

5

1

Once the policy is created, it must be applied to a SAP or binding within a service for these rates to take effect. This means the rate is on a per-SAP or per-binding basis. Only one policy may be applied to each SAP or binding. The eth-cfm-monitoring option must be configured in order for the ETH-CFM entries to be applied when the policy is applied to the SAP or binding. If this option is not configured, ETH-CFM entries in the policy will be ignored. It is also possible to apply a policy to a SAP or binding by configuring eth-cfm-monitoring which does not have an MP. In this case, although these entries are enforced, no packets are redirect to the CPU.

By default, rates are applied on a per-peer basis. This means each individual peer is subject to the rate. Use the aggregate option to apply the rate to all peers. MIPs, for example, only respond to loopback messages and linktrace messages. These are typically on-demand functions and per-peer rate limiting is not required, making the aggregate function more appealing.

The eth-cfm-monitoring and mac-monitoring commands are mutually exclusive and cannot be configured on the same SAP or binding. The mac-monitoring command is used in combination with the traditional CPU protection and is not specific to ETH-CFM rate limiting feature described here.

When an MP is configured on a SAP or binding within a service which allows an external source to communicate with that MP, for example a User to Network Interface (UNI), eth-cfm-monitoring with the aggregate option should be configured on all SAPs or bindings to provide the highest level of rate control.

The example below shows a sample configuration for a policy and the application of that policy to a SAP in a VPLS service configured with an MP.

Policy 1 entry 10 limits all ETH-CFM traffic redirected to the CPU for all possible combinations to 1 packet-per-second. Policy 1 entry 20 limits all possible combinations to a rate of zero, dropping all request which match any combination. If entry 20 did not exist then only rate limiting of the entry 10 matches would occur and any other ETH-CFM packets redirected to the CPU would not be bound by a CPU protection rate.

config>sys>security>cpu-protection#
  policy 1 
    eth-cfm
      entry 10 level 5-7 opcode 3,5 rate 1
      entry 20 level 0-7 opcode 0-255 rate 0
 
config>service>vpls#
  sap 1/1/4:100
    cpu-protection 1 eth-cfm-monitoring aggregate
    eth-cfm 
      mip
    no shutdown

2.3.4.3. ETH-CFM Ingress Squelching

CPU protection provides a granular method to control which ETH-CFM packets are processed. As indicated in CPU Protection Extensions for ETH-CFM, a unique rate can be applied to ETH-CFM packets classifying on specific MD-level and a specific OpCode and applied to both ingress (down MEP and ingress MIP) and egress (up MEP and egress MIP) extraction. This function is to protect the CPU on extraction when a Management Point (MP) is configured.

It is also important to protect the ETH-CFM architecture deployed in the service provider network. This protection scheme varies from CPU protection. This model is used to prevent ETH-CFM frames at the service provider MD-levels from gaining access to the network even when extraction is not in place. ETH-CFM squelching drops all ETH-CFM packets at or below the configured MD-level. The ETH-CFM squelch feature is supported at ingress only.

Figure 7 shows a typical ETH-CFM hierarchical model with a subscriber ME (6), test ME (5), EVC ME (4) and an operator ME (2). This model provides the necessary transparency at each level of the architecture. For security reasons, it may be necessary to prevent errant levels from entering the service provider network at the UNI, ENNI, or other untrusted interconnection points. Configuring squelching at level four on both UNI-N interconnection ensures that ETH-CFM packets matching the SAP or binding delimited configuration will silently discard ETH-CFM packets at ingress.

Figure 7:  ETH-CFM Hierarchical Model 

Squelching configuration uses a single MD-level (0 to 7) to silently drop all ETH-CFM packets matching the SAP or binding delimited configuration at or below the specified MD-level. In Figure 7, a squelch level is configured at MD-level 4. This means the configuration will silently discard MD-levels 0,1,2,3 and 4, assuming there is a SAP or binding match.

Note:

Extreme caution must be used when deploying this feature.

The operator is able to configure down MEPs and ingress MIPs that conflict with the squelched levels. This means that any existing MEP or MIP processing ingress CFM packets on a SAP or binding where a squelching policy is configured will be interrupted as soon as this command is entered into the configuration. These MPs will not be able to receive any ingress ETH-CFM frames because squelching is processed before ETH-CFM extraction.

CPU protection extensions for ETH-CFM are still required in the model above because the subscriber ME (6) and the test ME (5) are entering the network across an untrusted connection, the UNI. ETH-CFM squelching and CPU protection for ETH-CFM can be configured on the same SAP or binding. Squelching is processed followed by CPU protection for ETH-CFM.

MPs configured to support primary VLANs are not subjected to the squelch function. Primary VLAN-based MPs, supported only on Ethernet SAPs, are extractions that take into consideration an additional VLAN beyond the SAP configuration.

The difference in the two protection mechanisms is shown in the Table 15. CPU protection is used to control access to the CPU resources when processing is required. Squelching is required when the operator is protecting the ETH-CFM architecture from external sources.

Table 15:  CPU Protection and Squelching 

Description

CPU Protection Extension for ETH-CFM

ETH-CFM Squelching

Ingress Filtering

Yes

Yes

Egress Filtering

Yes

Granularity

Specified level and OpCode

Level (at and below)

Rate

Configurable rate (includes 0=drop all)

Silent drop

Primary VLAN Support

Rate shared with SAP delineation

Not exposed to squelch

Extraction

Requires MEP or MIP to extract

No MEP or MIP required

As well as including the squelching information under the show service service-id all, display output the squelch-ingress-level key also appears in the output of the sap-using and sdp-using show commands.

show service sap-using squelch-ingress-levels
===============================================================================
ETH-CFM Squelching
===============================================================================
PortId             SvcId      Squelch Level
-------------------------------------------------------------------------------
6/1/1:100.*        1          0 1 2 3 4 5 6 7
lag-1:100.*        1          0 1 2 3 4 
6/1/1:200.*        2          0 1 2 
lag-1:200.*        2          0 1 2 3 4 5 
-------------------------------------------------------------------------------
Number of SAPs: 4
------------------------------------------------------------------------------- 
===============================================================================
show service sdp-using squelch-ingress-levels
================================================================================
ETH-CFM Squelching
================================================================================
SdpId              SvcId       Type Far End                 Squelch Level 
-------------------------------------------------------------------------------
12345:4000000000   2147483650   Spok 10.1.1.1               0 1 2 3 4   
===============================================================================  

2.3.5. Distributed CPU Protection (DCP)

Distributed CPU Protection (DCP) is a rate-limiting function distributed to the line cards to rate-limit traffic extracted from the data path and sent to the CPM CPU. DCP is performed in hardware and provides a granular per-interface and per-protocol rate-limit control.

There are two main types of DCP policies for access or network interfaces and ports. The DCP policy defines the protocols and their associated policers. The list of protocols supported depends on the type of DCP policy:

  1. Access-network — This type of DCP policy is used to rate-limit interface level protocols and supports policing the following protocols: ARP, DHCP, HTTP redirect, ICMP, ICMP ping check, IGMP, MLD, NDIS, PPPoE-PPPoA, MPLS-TTL, BFD-CMP, BGP, ETH-CFM, ISIS, LDP, OSPF, PIM and RSVP. Additionally, traffic from other protocols or unconfigured protocols is classified in the all-unspecified DCP protocol.
  2. Port — This type of DCP policy is used to rate-limit the port-level protocols LACP, Dot1X, uBFD, and ELMI. The system supports LACP, BFD-CPM, and ETH-CFM as port-level protocols that can be rate-limited individually. Traffic from unconfigured protocols is classified in the all-unspecified DCP protocol (configure system security dist-cpu-protection policy protocol).

Also, a default DCP policy is assigned automatically to all network interfaces, access interfaces, and ports. These policies, “_default-access-policy”, “_default-network-policy”, and “_default-port-policy” are originally created empty and they can be modified by the operator. These default policies can be used, for example, to deploy a new DCP configuration covering all access and network interfaces or ports on the node.

Additional DCP policies can be created for interfaces or ports requiring a dedicated configuration.

2.3.5.1. Policer

The rate-limit are configured in the DCP policy using either static or dynamic policers and the exceed-action policer for non-conforming packets can be set to discard, low-priority or none.

Static Policer

Static policers are always instantiated for each endpoint to which the DCP policy is assigned.

The following example provides two simple customized default DCP policies using static policers for access and network interfaces:

  1. access DCP policy configured to drop all access traffic exceeding 6,000 PPS
  2. network DCP policy marks all traffic exceeding 3,000 PPS as low priority except for BGP and LDP (for example, the BGP and LDP can be rate-limited using per-peer-queuing)
A:7x50>config>sys>security>dist-cpu-protection# info
----------------------------------------------
                policy "_default-access-policy" create
                    static-policer "access" create
                        rate packets 6000 within 1
                        exceed-action discard
                    exit
                    protocol all-unspecified create
                        enforcement static "access"
                    exit
                exit
                policy "_default-network-policy" create
                    static-policer "null" create
                    exit
                    static-policer "network" create
                        rate packets 3000 within 1
                        exceed-action low-priority
                    exit
                    protocol all-unspecified create
                        enforcement static "network"
                    exit
                    protocol bgp create
                        enforcement static "null"
                    exit
                    protocol ldp create
                        enforcement static "null"
                    exit
                exit
----------------------------------------------

Local Monitor and Dynamic Policer

The use of local-monitoring-policer and dynamic policers reduces the number of policers required. This can be particularly useful in a large number of endpoints, such as subscribers in ESM networks. Instead of using multiple static policers for various protocols on each endpoints, a single policer (the local-monitoring-policer) is instantiated statically for a given endpoint and the per-protocol dynamic policers are instantiated when there is a violation of the local-monitoring-policer.

Dynamic policers are instantiated from a pool allocated per line card using the configure>card>fp>ingress>dist-cpu-protection>dynamic-enforcement-policer-pool command. This pool of policers should be greater than the maximum number of dynamic policers expected to be in use on the card at one time.

The following example monitors the rate of ARP, ICMP, IGMP and all-unspecified traffic. If the total rate exceeds 100 packets within 10 seconds, the system creates three dynamic policers for ARP, ICMP and IGMP to rate-limit each protocol to 20 packets within 10 seconds as well as a fourth policer to rate-limit the rest of the traffic to 100 packets within 10 seconds.

*A:Dut-A>config>sys>security>dist-cpu-protection# info
----------------------------------------------
                policy "dynamic-policy-example" create
                    description "Dynamic policing policy"
                    local-monitoring-policer "local-mon" create
                        description "Monitor for arp, icmp, igmp and all-unspecified"
                        rate packets 100 within 10
                    exit
                    protocol arp create
                        enforcement dynamic "local-mon"
                        dynamic-parameters
                            rate packets 20 within 10
                            exceed-action discard
                        exit
                    exit
                    protocol icmp create
                        enforcement dynamic "local-mon"
                        dynamic-parameters
                            rate packets 20 within 10
                            exceed-action discard
                        exit
                    exit
                    protocol igmp create
                        enforcement dynamic "local-mon"
                        dynamic-parameters
                            rate packets 20 within 10
                            exceed-action discard
                        exit
                    exit
                    protocol all-unspecified create
                        enforcement dynamic "local-mon"
                        dynamic-parameters
                            rate packets 100 within 10
                            exceed-action discard
                        exit
                    exit
                exit

2.3.5.2. Applicability

For the access interface, most types of SAPs on Layer 2 and Layer 3 services are supported including capture SAPs, SAPs on pseudowires, B-VPLS SAPs, and VPLS template SAPs, but are not applicable to Epipe template SAPs and video ISA SAPs.

Control packets that are extracted in a VPRN service, where the packets arrived into the node through a VPLS SAP (that is, R-VPLS scenario), use the DCP policy and policer instances associated with the VPLS SAP. For VPLSs that have a Layer 3 interface bound to them, (R-VPLS), protocols such as OSPF and ARP may be configured in the DCP policy.

Control traffic that arrives on a network interface, but inside a tunnel (for example, SDP, LSP, PW) and logically terminates on a service (that is, traffic that is logically extracted by the service rather than the network interface layer itself) bypass the DCP function. The control packets are not subject to the DCP policy that is assigned to the network interface on which the packets arrived. This helps to avoid customer traffic in a service from impacting other services or the operator's infrastructure.

2.3.5.3. Log Events, Statistics, Status, and SNMP Support

Log events are supported for DCP to alert the operator to potential attacks or misconfigurations. The DCP log events can be individually enabled or disabled at the DCP policy level as well as globally in the system (in log event-control). DCP throttles the rate of events to avoid event floods when multiple parallel attacks or problems.

Additional statistics are also available using the show router interface dist-cpu-protection command to display packet exceed-count and policer state. Tools commands, such as the tools dump security dist-cpu-protection violators command are used to identify interface violators.

For SNMP support, see the tables and MIB objects with “Dcp” or “DCpuProt” in their name. These can be found in the following MIBs:

  1. TIMETRA-CHASSIS-MIB
  2. TIMETRA-SECURITY-MIB
  3. TIMETRA-SAP-MIB
  4. TIMETRA-VRTR-MIB

2.3.5.4. DCP Policer Resource Management

The policer instances are a limited hardware resource on a given forwarding plane. DCP policers (static, dynamic, local-monitor) are consumed from the overall forwarding plane policer resources (from the ingress resources if ingress and egress are partitioned). Each per-protocol policer instantiated reduces the number of FP child policers available for other purposes.

When DCP is configured with dynamic enforcement, then the operator must set aside a pool of policers that can be instantiated as dynamic enforcement policers. The number of policers reserved for this function are configurable per card or FP. The policers in this pool are not available for other purposes (normal SLA enforcement).

Static enforcement policers and local monitoring policers use policers from the normal or global policer pool on the card or FP. Once a static policer is configured in a DCP policy and it is referenced by a protocol in the policy, then this policer will be instantiated for each object (SAP or network interface) that is created and references the policy. If there is no policer free on the associated card or FP, then the object will not be created. Similarly, for local monitors, once a local monitoring policer is configured and referenced by a protocol, then this policer will be instantiated for each object that is created and references the policy. If there is no policer free, then the object will not be created.

Dynamic enforcement policers are allocated as needed (when the local monitor detects nonconformance) from the reserved dynamic enforcement policer pool.

When a DCP policy is applied to an object on a LAG, then a set of policers is allocated on each FP (on each line card that contains a member of the LAG). The LAG mode is ignored and the policers are always shared by all ports in the LAG on that forwarding plane on the SAP or interface. In other words, with link-mode lag a set of DCP policers are not allocated per-port in the LAG on the SAP.

In order to support large scale operation of DCP, and also to avoid overload conditions, a polling process is used to monitor state changes in the policers. This means there can be a delay between when an event occurs in the data plane and when the relevant state change or event notification occurs towards an operator, but in the meantime the policers are still operating and protecting the control plane.

2.3.5.5. Operational Guidelines and Tips

The following points offer various optional guidelines that may help an operator decide how to leverage Distributed CPU Protection.

  1. The rates in a policy assigned to a capture SAP should be higher than those assigned to MSAPs that will contain a single subscriber. The rates for the capture sap policy should allow for a burst of MSAP setups.
  2. To completely block a set of specific protocols on a given SAP, create a single static policer with a rate of 0 and map the protocols to that policer. Dynamic policers and local monitors can not be used to simultaneously allow some protocols but block others (the non-zero rates in the monitor would let all protocols slip through at a low rate).
  3. During normal operation it is recommended to configure “log-events” (no verbose keyword) for all static policers, in the dynamic parameters of all protocols and for all local monitoring policers. The verbose keyword can be used selectively during debug, testing, tuning, and investigations.
  4. Packet-based rate limiting is generally recommended for low-rate subscriber- based protocols whereas kb/s rate limiting is recommended for higher rate infrastructure protocols (such as BGP).
  5. It is recommended to configure an exceed-action of low-priority for routing and infrastructure protocols. Marked packets are more likely to be discarded if there is congestion in the control plane of the router, but will get processed if there is no contention for CPU resources allowing for a work-conserving behavior in the CPM.
  6. In order to assign a different dist-cpu-protection policy to a specific MSAP instance or to all MSAPs for a specific MSAP policy, the operator can assign a new dist-cpu-protection policy to the MSAP policy and then use the eval-msap tool:
    A:nodeA>tools>perform# subscriber-mgmt eval-msap - eval-msap {policy msap-policy-name | msap sap-id}
    Note:

    Any new MSAPs will also be assigned the new dist-cpu-protection policy.

  7. If needed, an operator can determine which subscriber is on a specific MSAP by using the show service active-subs command and then filtering (“| match”) on the MSAP string.
  8. If protocol is trusted, and using the “all-unspecified” protocol is not required, then avoid referencing this protocol in the policy configuration.
  9. If a protocol is trusted, but the all-unspecified bucket is required, then there are two options:
    1. avoid creating a protocol so that it is treated as part of the all-unspecified bucket (but account for the packets from X in the all-unspecified rate and local-mon rate)
    2. create this protocol and configure it to bypass

2.3.6. Classification-Based Priority for Extracted Protocol Traffic

The SR OS supports a set of mechanisms to protect the router control and management planes from various types of attacks, floods, and misconfigurations. Many of the mechanisms operate by default with no need for operator configuration or intervention.

One class of mechanisms employed on the router to protect against floods of control traffic involves identifying potentially harmful or malicious traffic through the use of rate measurements. Centralized CPU protection protects and isolates interfaces from each other by default by treating unexpectedly high rate control traffic on an interface as lower priority (to be discarded if the control plane experiences congestion). Distributed CPU protection can protect and isolate at a per-protocol, per-interface granularity through configured rate profiles. These rate-based protection mechanisms make no assumptions about the contents of the packets and can be used when nothing about the packets can be trusted (for example, DSCP or source IP address, which can be spoofed).

The SR OS also supports an alternative to rate-based mechanisms for cases where the packet headers can be trusted to differentiate between good and bad control traffic. A configurable prioritization scheme can be enabled (using the init-extract-prio-mode l3-classify command) on a per-FP basis to initialize the drop priority of all Layer 3 extracted control traffic based on the QoS classification of the packets. This is useful, for example, in networks where the DSCP and EXP markings can be trusted as the primary method to distinguish, protect, and isolate good terminating protocol traffic from unknown or potentially harmful protocol traffic instead of using the rate-based distributed CPU protection and centralized CPU protection traffic marking/coloring mechanisms (for example, out-profile-rate and exceed-action low-priority).

The operational guidelines for deploying classification-based priority for extracted control traffic are as follows.

  1. Centralized CPU protection should be effectively disabled for all interfaces/SAPs on FPs configured in l3-classify mode by changing some CPU protection policy parameters from their default values. This is required so that centralized CPU protection does not re-mark good control traffic (traffic that was initially classified as high priority) as low priority if a flood attack occurs on the same interface. Effectively disabling centralized CPU protection can be done by ensuring that:
    1. a rate value of max is configured for port-overall-rate (max is the default value for port-overall-rate)
    2. all objects (interfaces, MSAP policies, and SAPs) that can be assigned a CPU protection policy are referencing a policy that sets the out-profile-rate to max and the overall-rate to max (this can be done in the two default CPU protection policies if all FPs in the system are in l3-classify mode)
  2. DCP can be used in conjunction with l3-classify mode, but care must be taken to prevent DCP from acting on protocols where the operator wants to use QoS classification (such as DSCP or EXP) to differentiate between good and bad Layer 3 packets. On an FP with l3-classify mode, DCP should be configured so that BGP, LDP, and other protocols do not have their initial drop priority (color) overwritten by DCP if the QoS classification of these protocols is trusted. This can be achieved by using exceed-action none for those protocols in a DCP policy. For other protocols where QoS classification cannot be used to distinguish between good and bad extracted packets, DCP can be used to color the packets with a drop priority based on a configured rate.
  3. If any LAG member is on an FP in l3-classify mode, all FPs that host the other members of that LAG should also be in l3-classify mode.
  4. The QoS classification rules that are used on interfaces/SAPs on FPs in l3-classify mode should be configured to differentiate between good and bad control traffic. The default network ingress QoS policies do differentiate (for example, based on DSCP), but the default access ingress QoS policies do not.

The l3-classify mode for extracted control traffic is supported on the 7750 SR and 7950 XRS.

2.3.7. TTL Security

The SR OSTTL security evaluates the value of the incoming packets against a maximum TTL value configured in the system. This capability, also known as Generalized TTL Security Mechanism (GTSM) defined in RFC 5082, is supported for BGP, LDP, SSH and Telnet. If the incoming TTL value is less than the configured TTL value, the packets are discarded and a log is generated preventing attackers generating spoof traffic with larger number of hops than expected.

The TTL value is configurable on a per-peer basis for BGP and LDP and configurable at the system level for SSH and Telnet.

The TTL security mechanism was originally designed to protect the BGP infrastructure where the vast majority of ISP External Border Gateway Protocol (EBGP) peerings are established between adjacent routers. Since TTL spoofing cannot be performed, a mechanism based on an expected TTL value provides a simple and robust defense from infrastructure attacks based on forged BGP packets.

While TTL security is most effective in protecting directly-connected BGP or LDP peers, it can also provide protection to multi-hop sessions. For multi-hop sessions the expected TTL value can be set to 255 minus the configured range of hops.

2.3.8. Management Access Filter

Management Access Filters (MAF) are software-based filters used to restrict both traffic extracted from the data plane and traffic from the management port to the CPU.

2.3.8.1. MAF Filter Packet Match

Three different management-access-filter policies can be configured: ip-filter, ipv6-filter, and mac-filter. Each policy is an ordered list of entries. For this reason, entries must be sequenced correctly from the most to the least explicit.

Management Access filter (MAF) packet match rules:

  1. Each MAF policy is an ordered list of entries, therefore entries must be sequenced correctly from the most to the least explicit.
  2. If multiple match criteria are specified in a single MAF filter policy entry, all criteria must be met for the packet to be considered a match against that policy entry (logical AND).
  3. Any match criteria not explicitly defined is ignored during a match.
  4. A MAF filter policy entry with match criteria defined, but no action configured, inherits the default action.
  5. The management-access-filter default-action applies individually per IPv4, IPv6, or MAC CPM filter policies that are in a no shutdown state.
  6. When both mac-filter and ip-filter or ipv6-filter are applied to a specific packet, mac-filter is applied first.

2.3.8.2. MAF IPv4/IPv6 Filter Entry Match Criteria

Table 16 lists the supported IPv4 and IPv6 match criteria.

Table 16:  IPv4 and IPv6 Match Criteria  

Criteria

Description

src-ip

Matches the specified source IPv4 or IPv6 address prefix and mask against the source IPv4 or IPv6 address field in the IP packet header. IPv4 and IPv6 matching prefix-lists can be used to enhance matching capabilities.

next-header

Matches the specified upper-layer protocol (such as TCP, UDP, or IGMPv6) against the next-header field of the IPv6 packet header. "*" can be used to specify a TCP or UDP upper-layer protocol match (Logical OR). Next-header matching allows also matching on presence of a subset of IPv6 extension headers. See the CLI section for details on which extension header match is supported.

protocol

Matches the specified protocol against the Protocol field in the IPv4 packet header (for example, TCP, UDP, or IGMP) of the outer IPv4. "*" can be used to specify TCP or UDP upper-layer protocol match (Logical OR).

dst-port

Matches the specified port value against the destination port number of the UDP or TCP packet header.

flow-label

Matches the IPv6 flow label.

router

Matches the router instance packets that are ingressing from for this filter entry.

src-port

Matches the port packets that are ingressing from for this filter entry.

2.3.8.3. MAF MAC Filter Entry Match Criteria

Table 17 describes the supported MAC match criteria. The criteria are evaluated against the Ethernet header of the Ethernet frame.

Table 17:  Router Instance Match Criteria  

Criteria

Description

frame-type

Matches a specific type of frame format.

src-mac

Matches the specified source MAC address frames. Optionally, operators can configure a mask to be used in a match.

dst-mac

Matches the specified destination MAC address frames. Optionally, operators can configure a mask to be used in a match.

dot1p

Matches 802.1p frames. Optionally, operators can configure a mask to be used in a match.

etype

Matches the specified Ethernet II frames. The Ethernet type field is a two-byte field used to identify the protocol carried by the Ethernet frame.

snap-oui

Matches frames with the specified three-byte OUI field.

snap-pid

Matches frames with the specified two-byte protocol ID that follows the three-byte OUI field.

ssap

Matches the specified frames with a source access point on the network node designated in the source field of the packet. Optionally, operators can configure a mask to be used in a match.

dsap

Matches the specified frames with a destination access point on the network node designated in the destination field of the packet. Optionally, operators can configure a mask to be used in a match.

cfm-opcode

Matches the specified packet with the specified cfm-opcode.

svc-id

Matches the service ID packets are ingressing from.

svc-name

Matches the service name packets are ingressing from.

2.3.8.4. MAF Filter Policy Action

A management access filters allow to permit or deny (or use deny-host-unreachable response for IP filters) traffic.

2.3.8.5. MAF Filter Policy Statistics and Logging

Management access filter match count can be displayed using show commands. Logging is recorded in the system security logs.

2.4. Vendor-Specific Attributes (VSAs)

The software supports the configuration of Nokia-specific RADIUS attributes. These attributes are known as vendor-specific attributes (VSAs) and are discussed in RFC 2138. VSAs must be configured when RADIUS authorization is enabled. It is up to the vendor to specify the format of their VSA. The attribute-specific field is dependent on the vendor's definition of that attribute. The Nokia-defined attributes are encapsulated in a RADIUS vendor-specific attribute with the vendor ID field set to 6527, the vendor ID number.

Note:

The PE-record entry is required to support the RADIUS Discovery for Layer 2 VPN feature. A PE-record is only relevant if the RADIUS Discovery feature is used, not for the standard RADIUS setup.

The following RADIUS vendor-specific attributes (VSAs) are supported by Nokia.

  1. timetra-access <ftp> <console> <both> — This is a mandatory command that must be configured. This command specifies if the user has FTP and /or console (serial port, Telnet, and SSH) access.
  2. timetra-profile <profile-name> — When configuring this VSA for a user, it is assumed that the user profiles are configured on the local router and the following applies for local and remote authentication:
    1. The authentication-order parameters configured on the router must include the local keyword.
    2. The user name may or may not be configured on the router.
    3. The user must be authenticated by the RADIUS server.
    4. Up to 8 valid profiles can exist on the router for a user. The sequence in which the profiles are specified is relevant. The most explicit matching criteria must be ordered first. The process stops when the first complete match is found.
      If all the above mentioned conditions are not met, then access to the router is denied and a failed login event/trap is written to the security log.
  3. timetra-default-action <permit-all | deny-all | none> — This is a mandatory command that must be configured even if the timetra-cmd VSA is not used. This command specifies the default action when the user has entered a command and no entry configured in the timetra-cmd VSA for the user resulted in a match condition.
  4. timetra-cmd <match-string> — Configures a command or command subtree as the scope for the match condition.
    The command and all subordinate commands in subordinate command levels are specified.

2.5. Other Security Features

This section describes the other security features supported by the SR OS.

2.5.1. SSH

Secure Shell (SSH) is a protocol that provides a secure, encrypted Telnet-like connection to a router. A connection is always initiated by the client (the user). Authentication takes places by one of the configured authentication methods (local, RADIUS, TACACS+, and LDAP). With authentication and encryption, SSH allows for a secure connection over an insecure network.

The OS allows the administrator to configure Secure Shell version 1 (SSHv1) and version 2 (SSHv2). SSHv1 and SSHv2 are different protocols and encrypt at different parts of the packets. SSHv2 does not use the same networking implementation that SSHv1 does and is considered a more secure, efficient, and portable version of SSH.

SSH runs on top of a transport layer (like TCP or IP), and provides authentication and encryption capabilities.

The OS has a global SSH server process to support inbound SSH, sFTP, NETCONF, and SCP sessions initiated by external client applications. This server process is separate from the SSH and SCP client commands on the routers which initiate outbound SSH and SCP sessions.

Inbound SSH, Telnet, and FTP sessions are counted separately and it is possible to set the limit for each type separately in the config>system>login-control submenu, However there is a maximum total of 50 sessions for SSH and Telnet together. SCP, sFTP, and NETCONF sessions are counted as SSH sessions.

When the SSH server is enabled, an SSH security key is generated. Unless the preserve-key option is configured for SSH, the security key is only valid until the node is restarted or the SSH server is stopped and restarted. The key size is non-configurable and set to 2048 for SSHv2 RSA, and to 1024 for SSHv2 DSA and SSHv1 RSA1. Only SSHv2 RSA is supported in FIPS mode. When the server is enabled, all inbound SSH, SCP, sFTP, and NETCONF sessions will be accepted provided the session is properly authenticated.

When the global SSH server process is disabled, no inbound SSH, SCP, sFTP, or NETCONF sessions will be accepted.

When using SCP to copy files from an external device to the file system, the SCP server will accept either forward slash (“/”) or backslash (“\”) characters to delimit directory and/or filenames. Similarly, the SCP client application can use either slash or backslash characters, but not all SCP clients treat backslash characters as equivalent to slash characters. In particular, UNIX systems will often times interpret the backslash character as an “escape” character which does not get transmitted to the SCP server. For example, a destination directory specified as “cf1:\dir1\file1” will be transmitted to the SCP server as “cf1:dir1file1” where the backslash escape characters are stripped by the SCP client system before transmission. On systems where the client treats the backslash like an “escape” character, a double backslash “\\” or the forward slash “/” can typically be used to properly delimit directories and the filename.

There are three pairs of configurable lists: cipher lists, MAC lists, and KEX lists. In each pair one list is dedicated to the SSH server and second to the SSH/SCP client. These can be configured for negotiation of the best compatible cipher, MAC, and KEX algorithm between the client and server. The lists can be created and managed under the security ssh submenu. The client lists are used when the SR OS is acting as the SSH client and the server lists are used when the SR OS is acting as a server. The first algorithm matched on the lists between the client and server is the preferred algorithm for the session.

SSHv2 authentication methods supported by the SR OS are password, keyboard-interactive, and public key.

Note:

SSHv1 is not supported when the node is running in FIPS-140-2 mode.

2.5.1.1. SSH PKI Authentication

The SSH server also supports a public key authentication as long as the server has been previously configured to know the client's public key.

Using Public Key authentication (also known as Public Key Infrastructure - PKI) can be more secure than the existing username and password method because:

  1. A user will typically re-use the same password with multiple servers. If the password is compromised, the user must reconfigure the password on all affected servers.
  2. A password is not transmitted between the client and server using PKI. Instead the sensitive information (the private key) is kept on the client. Therefore the password is less likely to be compromised.

SR OS supports server-sider SSHv2 public key authentication but does not include a key-generation utility.

Support for PKI should be configured in the system-level configuration where one or more public keys may be bound to a username. This configuration will not affect any other system security or login functions.

PKI has preference over password or keyboard authentication. PKI is supported using local authentication and using an AAA server with LDAP only. PKI authentication is not supported on TACACS+ or RADIUS, and users with public keys always use local authentication only.

2.5.1.1.1. User Public Key Generation

Before SSH can be used with PKI, someone must generate a public/private key pair. This is typically supported by the SSH client software. For example, PuTTY supports a utility called PuTTYGen that will generate key pairs.

SR OS currently supports only RSA and ECDSA user public keys.

If the client is using PuTTY, they will first generate a key pair using PuTTYGen. The user sets the key type to SSH-2 RSA and sets the number of bits to be used for the key. The user can also configure a passphrase that is used to store the key locally in encrypted form. If the passphrase is configured, the user must enter the passphrase in order to use the private key, acting as a password for the private key. If a passphrase is not used, the key is stored in plain text locally.

Next, the public key must be configured for the user on SR OS using the config>system>security>user>public-keys command. On the SR OS, the user can program the public key using Telnet/SSH or SNMP.

2.5.1.2. MAC Client and Server List

SR OS supports a configurable server and client MAC list for SSHv2. This allows the user to add or remove MAC algorithms from the list. The user can program the strong HMAC algorithms on top of the configurable MAC list (for example, lowest index in the list) in the order to be negotiated first between the client and server. The first algorithm in the list that is supported by both the client and the server is the one that is agreed upon.

There are two configurable MAC lists:

  1. server list
  2. client list

The default MAC list includes all supported algorithms with the following preference:

  1. mac 200 name hmac-sha2-512
  2. mac 210 name hmac-sha2-256
  3. mac 215 name hmac-sha1
  4. mac 220 name hmac-sha1-96
  5. mac 225 name hmac-md5
  6. mac 230 name hmac-ripemd160
  7. mac 235 name hmac-ripemd160-openssh-com
  8. mac 240 name hmac-md5-96
Note:

Configurable MAC list is only supported for SSHv2 and not supported for SSHv1. SSv1 only supports 32-bit CRC.

2.5.1.3. KEX Client and Server List

SR OS supports KEX client and server lists. The user can remove or add the desired KEX client/server algorithms to be negotiated using an SSHv2 phase one handshake. The list is an index list with the lower index having higher preference in the SSH negotiation. The lowest index algorithm in the list will be negotiated first in SSH and will be on top of the negotiation list to the peer.

By default the KEX list is empty and this hard-coded list with all supported algorithms and the following preference is used:

  1. kex 200 name diffie-hellman-group16-sha512
  2. kex 210 name diffie-hellman-group14-sha256
  3. kex 215 name diffie-hellman-group14-sha1
  4. kex 220 name diffie-hellman-group-exchange-sha1
  5. kex 225 name diffie-hellman-group1-sha1

As soon as any algorithm is configured in the KEX list, the SR OS will start using the user-defined KEX list instead of the hard-coded list. To go back to the hard-coded list, the user must remove all configured KEX indexes until the list is empty.

The CLI used is inline with cipher/mac server/client list and is as follow:

configure system security ssh server-kex-list kex
   kex <index> name <kex-name>
   no kex <index>
 
configure system security ssh client-kex-list kex
   kex <index> name <kex-name>
   no kex <index>
 
<index>              : [1..255]
<kex-name>           : diffie-hellman-group14-sha1| diffie-hellman-group14-sha256|
                       diffie-hellman-group16-sha512|
     diffie-hellman-group-exchange-sha1| diffie-hellman-group1-sha1

2.5.1.4. Regenerate the SSH key without disabling SSH

SR OS supports periodic rollover of the SSH symmetric key. Symmetric key rollover is important in long SSH sessions. Symmetric key rollover ensures that the encryption channel between the client and server is not jeopardized by an external hacker that is trying to break the encryption via a brute force attack.

This feature introduces symmetric key rollover on SSH client or server. The following are triggers for symmetric key rollover and negotiation:

  1. the negotiation of the key base on a configured time period
  2. the negotiation of the key base on a configured data transmission size

For extra security, by default, the key re-exchange is enabled under SR OS. The default values are as follow:

        client
            bytes 1000000000
            minutes 60
            no shutdown
         exit
         server
            bytes 1000000000
            minutes 60
            no shutdown
         exit

2.5.1.4.1. Key re-exchange procedure

Key re-exchange is started by sending an SSH_MSG_KEXINIT packet while not already doing a key exchange. When this message is received, a party must respond with its own SSH_MSG_KEXINIT message, except in cases where the received SSH_MSG_KEXINIT already was a reply. Either party may initiate the re-exchange, but roles must not be changed (for example, the server remains the server, and the client remains the client).

Key re-exchange is performed using whatever encryption was in effect when the exchange was started. Encryption, compression, and MAC methods are not changed before a new SSH_MSG_NEWKEYS is sent after the key exchange (as in the initial key exchange). Re-exchange is processed identically to the initial key exchange, except that the session identifier will remain unchanged. Some or all of the algorithms can be changed during the re-exchange. Host keys can also change. All keys and initialization vectors are recomputed after the exchange. Compression and encryption contexts are reset.

RFC 4253 recommends key exchange after every hour or 1Gbytes of transmitted data, which is met by SR OS default implementation.

SR OS can roll over keys via two mechanisms:

  1. bytes (default is 1 Gbyte and the keys will be negotiated)
  2. minutes (default is 1 minute)
Note:

  1. If both the bytes and minutes key rollover mechanisms are configured, the key rollover happens based on whichever occurs first.
  2. If these parameters change, only new SSH connections inherit them. The existing SSH connections continue to use the previously configured parameters.

2.5.1.5. Cipher Client and Server List

SR OS supports cipher client and server lists. The user can add or remove the desired SSH cipher client/server algorithms to be negotiated. The list is an index list with the lower index having higher preference in the SSH negotiation. The lowest index algorithm in the list will be negotiated first in SSH and will be on top of the negotiation list to the peer.

There is separate cipher list for SSHv1 and SSHv2 for both client and server.

The default client cipher list for SSHv1 includes all supported algorithms with the following preference:

  1. cipher 200 name 3des
  2. cipher 205 name blowfish
  3. cipher 210 name des

The default Server cipher list for SSHv1 includes algorithms in the following preference order:

  1. cipher 200 name 3des
  2. cipher 205 name blowfish

The default server and client lists for SSHv2 include all supported algorithms with the following preference:

  1. cipher 190 name aes256-ctr
  2. cipher 192 name aes192-ctr
  3. cipher 194 name aes128-ctr
  4. cipher 200 name aes128-cbc
  5. cipher 205 name 3des-cbc
  6. cipher 210 name blowfish-cbc
  7. cipher 215 name cast128-cbc
  8. cipher 220 name arcfour
  9. cipher 225 name aes192-cbc
  10. cipher 230 name aes256-cbc
  11. cipher 235 name rijndael-cbc

The CLI used to configure client/server cipher list is as follows:

configure system security ssh server-cipher-list
    server-cipher-list protocol-version <version>
 <version>            : [1..2]
configure system security ssh server-cipher-list protocol-version 2 ciper
    no cipher <index>
    cipher <index> name <cipher-name>
 
<index>              : [1..255]
 <cipher-name> : aes128-ctr | aes192-ctr | aes256-ctr | 3des-cbc| blowfish-cbc| 
cast128-cbc | arcfour | aes128-cbc | aes192-cbc | aes256-cbc | rijndael-cbc

2.5.2. Exponential Login Backoff

A malicious user may attempt to gain CLI access by means of a dictionary attack using a script to automatically attempt to login as an “admin” user and using a dictionary list to test all possible passwords. Using the exponential-back off feature in the config>system>login-control context the OS increases the delay between login attempts exponentially to mitigate attacks.

A malicious user may attempt to gain CLI access by means of a dictionary attack using a script to automatically attempt to login as an “admin” user and using a dictionary list to test all possible passwords. Using the exponential-back off feature in the config>system>login-control context the OS increases the delay between login attempts exponentially to mitigate attacks.

When a user tries to login to a router using a Telnet or an SSH session, there are a limited number of attempts allowed to authenticate a user. The interval between the unsuccessful attempts change after each try (1, 2 and 4 seconds). If the system is configured for user lockout, then the user will be locked out when the number of attempts is exceeded.

However, if lockout is not configured, there are three password entry attempts allowed after the first failure, at fixed 1, 2 and 4 second intervals, in the first session, and then the session terminates. Users do not have an unlimited number of login attempts per session. After each failed authentication attempt, the wait period becomes longer until the maximum number of attempts is reached.

The OS terminates after four unsuccessful tries. A wait period will never be longer than 4 seconds. The periods are fixed and will restart in subsequent sessions.

The config>system>login-control>[no] exponential-backoff command works in conjunction with the config>system>security>password>attempts command, which is also a system wide configuration.

For example:

*A:ALA-48>config>system# security password attempts
  - attempts <count> [time <minutes1>] [lockout <minutes2>]
  - no attempts
 
 <count>              : [1..64]
 <minutes1>           : [0..60]
 <minutes2>           : [0..1440]
 

Exponential backoff applies to any user and by any login method such as console, SSH and Telnet.

Refer to Configuring Login Controls.

2.5.3. User Lockout

When a user exceeds the maximum number of attempts allowed (the default is 3 attempts) during a certain period of time (the default is 5 minutes), the account used during those attempts will be locked out for a pre-configured lock-out period (the default is 10 minutes).

A security or LI event log will be generated as soon as a user account has exceeded the number of allowed attempts, and the show>system>security>user command can be used to display the total number of failed attempts per user.

In addition to the security or LI event log, an SNMP trap is also generated so that any SNMP server (including the NSP NFM-P) can use the trap for an action.

The account will be automatically re-enabled as soon as the lock-out period has expired. The list of users who are currently locked out can be displayed with the show>system>security>lockout command.

A lock-out for a specific user can be administratively cleared using the admin>user user-name>clear-lockout command.

2.5.4. CLI Login Scripts

The SR OS supports automatic execution of CLI scripts when a user successfully logs into the router and starts a CLI session.

Users who authenticate via the local user database can use the configurable config>system>security>user user-name>console>login-exec file-url login exec script.

A global login-script can be configured to execute a common script when any user logs into CLI. A per user login-script can also be configured to execute when a specific user logs into CLI. These login-scripts execute whether the user was authenticated via the local user database, TACACS+ or RADIUS.

To configure a global login exec script, use the config>system>login-control>login-scripts> global file-url script.

To configure a user-specific login exec script, use the config>system>login-control>login-scripts>per-user>user-directory>file-url file-name file-name script.

2.5.5. 802.1x Network Access Control

The SR OS supports network access control of client devices (PCs, STBs, etc.) on an Ethernet network using the IEEE. 802.1x standard. 802.1x is known as Extensible Authentication Protocol (EAP) over a LAN network or EAPOL.

2.5.6. TCP Enhanced Authentication Option

The TCP Enhanced Authentication Option, currently covered in RFC 5925, The TCP Authentication Option, extends the previous MD5 authentication option to include the ability to change keys without tearing down the session, and allows for stronger authentication algorithms to be used.

The TCP Enhanced Authentication Option is a TCP extension that enhances security for BGP, LDP and other TCP-based protocols. This includes the ability to change keys in a BGP or LDP session seamlessly without tearing down the session. It is intended for applications where secure administrative access to both the end-points of the TCP connection is normally available.

TCP peers can use this extension to authenticate messages passed between one another. This strategy improves upon current practice, which is described in RFC 2385, Protection of BGP Sessions via the TCP MD5 Signature Option. Using this new strategy, TCP peers can update authentication keys during the lifetime of a TCP connection. TCP peers can also use stronger authentication algorithms to authenticate routing messages.

2.5.6.1. Packet Formats

0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|  Kind  | Length  |T|K| Alg ID|Res| Key ID |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Authentication Data |
| // |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

Option Syntax

  1. Kind: 8 bits
    The Kind field identifies the TCP Enhanced Authentication Option. This value will be assigned by IANA.
  2. Length: 8 bits
    The Length field specifies the length of the TCP Enhanced Authentication Option, in octets. This count includes two octets representing the Kind and Length fields.
    The valid range for this field is from 4 to 40 octets, inclusive.
    For all algorithms specified in this memo the value will be 16 octets.
  3. T-Bit: 1 bit
    The T-bit specifies whether TCP Options were omitted from the TCP header for the purpose of MAC calculation. A value of 1 indicates that all TCP options other than the Extended Authentication Option were omitted. A value of 0 indicates that TCP options were included.
    The default value is 0.
  4. K-Bit: 1 bit
    This bit is reserved for future enhancement. Its value must be equal to zero.
  5. Alg ID: 6 bits
    The Alg ID field identifies the MAC algorithm.
  6. Res: 2 bits
    These bits are reserved. They must be set to zero.
    Key ID: 6 bits
    The Key ID field identifies the key that was used to generate the message digest.
  7. Authentication Data: Variable length
  8. The Authentication Data field contains data that is used to authenticate the TCP segment. This data includes, but need not be restricted to, a MAC. The length and format of the Authentication Data Field can be derived from the Alg ID.
  9. The Authentication for TCP-based Routing and Management Protocols draft provides and overview of the TCP Enhanced Authentication Option. The details of this feature are described in draft-bonica-tcp-auth-04.txt.

2.5.6.2. Keychain

The keychain mechanism allows for the creation of keys used to authenticate protocol communications. Each keychain entry defines the authentication attributes to be used in authenticating protocol messages from remote peers or neighbors, and it must include at least one key entry to be valid. Through the use of the keychain mechanism, authentication keys can be changed without affecting the state of the associated protocol adjacencies for OSPF, IS-IS, BGP, LDP, and RSVP-TE.

Each key within a keychain must include the following attributes for the authentication of protocol messages:

  1. key identifier
  2. authentication algorithm
  3. authentication key
  4. direction
  5. start time

In addition, additional attributes can be optionally specified, including:

  1. end time
  2. tolerance

Table 18 shows the mapping between these attributes and the CLI command to set them.

Table 18:  Keychain Mapping  

Definition

CLI

The key identifier expressed as an integer (0...63)

config>system>security>keychain>direction>bi>entry

config>system>security>keychain>direction>uni>receive>entry

config>system>security>keychain>direction>uni>send>entry

Authentication algorithm to use with key[i]

config>system>security>keychain>direction>bi>entry with algorithm algorithm parameter.

config>system>security>keychain>direction>uni>receive>entry with algorithm algorithm parameter.

config>system>security>keychain>direction>uni>send>entry with algorithm algorithm parameter.

Shared secret to use with key[i].

config>system>security>keychain>direction>uni>receive>entry with shared secret parameter

config>system>security>keychain>direction>uni>send>entry with shared secret parameter

config>system>security>keychain>direction>bi>entry with shared secret parameter

A vector that determines whether the key[i] is to be used to generate MACs for inbound segments, outbound segments, or both.

config>system>security>keychain>direction

Start time from which key[i] can be used.

config>system>security>keychain>direction>bi>entry>begin-time

config>system>security>keychain>direction>uni>send>entry >begin-time

End time after which key[i] cannot be used by sending TCPs.

Inferred by the begin-time of the next key (youngest key rule).

Start time from which key[i] can be used.

config>system>security>keychain>direction>bi>entry>begin-time

config>system>security>keychain>direction>bi>entry>tolerance

config>system>security>keychain>direction>uni>receive>entry >begin-time

config>system>security>keychain>direction>uni>receive>entry >tolerance

End time after which key[i] cannot be used

config>system>security>keychain>direction>uni>receive>entry>end-time

Table 19 lists the authentication algorithms that can be used in association with specific routing protocols.

Table 19:  Security Algorithm Support Per Protocol 

Protocol

Clear Text

MD5

HMAC-MD5

HMAC-SHA-1-96

HMAC-SHA-1

HMAC-SHA-256

AES-128-CMAC-96

OSPF

Yes

Yes

Yes

Yes

Yes

IS-IS

Yes

Yes

Yes

Yes

RSVP

Yes

Yes

Yes

BGP

Yes

Yes

Yes

LDP

Yes

Yes

Yes

2.5.7. gRPC Authentication

gRPC communication between the client and server must be authenticated and encrypted. There are two types of authentication:

  1. Authentication via session credentials — Session credentials operate similarly to device authentication, ensuring that the device is allowed in the network and is authorized by the provider. This type of authentication is performed using PKI and X.509.3 certificates. gRPC uses TLS for session authentication.
    SR OS supports TLS servers for gRPC.
  2. Authentication using channel credentials — Channel credentials use a user name and password that are entered at the gRPC client terminal to authenticate gRPC packets using an AAA method.

Session authentication provides proof that the client and server are authorized devices and that they belong to the provider. After authentication, the session becomes encrypted using TLS, and gRPC PDUs are transmitted between the client and server.

Figure 8 shows a basic session authentication using TLS.

Figure 8:  Session Authentication Using TLS 

Channel credentials use username and password authentication. Each gRPC channel packet can contain a username and a password. Authentication is done through standard SR OS authentication order and mechanisms. All current authentication methods, including local and AAA servers, are applicable to gRPC channels. In addition, all authentication orders currently used by Telnet or SSH are compatible with gNMI Call authentication.

Figure 9 shows a basic gNMI Call authentication using SR OS.

Figure 9:  gNMI Call Authentication Using SR OS 

The gRPC channel packets contain the username and password in clear text, and are only encrypted using TLS. If a TLS server profile is assigned to the gRPC session, all PDUs between the server and client are encrypted. If TLS becomes operationally down, no gRPC PDUs are transmitted in clear text.

SR OS relies on existing authentication mechanisms for gRPC channels, including:

  1. AAA servers and local authentication orders configured using the config>system>security>password>authentication-order command
  2. password complexity rules
  3. requiring the user to be configured as part of gRPC access by using the config>system>security>user>access>grpc command
  4. disconnecting the gRPC session by using the admin>disconnect gNMI command
    Note:

    gRPC is not affected by password aging.

Security profiles can authorize bulk get, set, and subscribe gRPC commands that are received by the server. Profiles can be configured to permit or deny specific gRPC commands; for example, a profile for one user can authorize get and set commands, while a profile for another user can authorize get commands only.

2.5.8. Hash Management per Management Interface Configuration

Hash management is configurable per management interface, for example, the classic CLI, the MD-CLI, NETCONF, or gRPC. Each management interface will have its own write-hash algorithm. Depending on which management interface the user logs into, the write hash of that interface should be checked and used for displaying the critical phrases.

In the classic CLI interface, the read and write hash algorithms can be different, for example, hash for write and hash2 for read.

For the MD-CLI, NETCONF, and gRPC interfaces, when a hash is configured, only write will be implemented using that hash algorithm. For example, if hash2 is configured, SR OS will display the phrase in hash2 format and read the phrase in all formats. The read algorithm is not affected by hash algorithm configuration and SR OS reads in all hash formats.

2.5.8.1. Hash encryption Using AES-256

Hash and hash2 use the AES-256 algorithm for all interfaces. However, hash2 uses module-specific text to make the hash unique per module or protocol. For example, BGP will use a different pre-pending text than IGP. This pre-pending text is appended to the key and then hashed using hash2.

Classic CLI hash has been changed to AES-256.

Upgrade from DES to AES-256 is allowed and loading a config file in classic CLI with DES to a new software that supports AES-256 is also allowed.

The DES and the DES key should only be used for decryption of the old password to obtain clear text and the password should then be rehashed using AES-256. The few characters of the old hashed phrase are used to determine that the phrase is hashed using DES.

2.5.8.2. Clear Text

The cleartext option for the write algorithm displays the hash in clear text in the config file, info, info detail, and so on.

2.5.9. Enrollment over Secure Transport

The Enrollment over Secure Transport (EST) protocol as specified in RFC 7030, Enrollment over Secure Transport, is used to enroll a certificate from a Certificate Authority (CA). SR OS supports the following EST client-side operations:

  1. download a CA certificate (/cacert)
  2. enroll a new certificate (/simpleenroll)
  3. renew an existing certificate (/simplereenroll)

The admin certificate est commands are used to perform the preceding operations. Each operation requires an EST profile which contains the EST configuration.

The following options are supported for SR OS client to authenticate the EST server.

  1. Explicit TA is achieved by configuring the config>system>security>tls>client-tls-profile> trust-anchor-profile name command which is referenced in the EST profile.
  2. No authentication is performed if the previous option is not configured.

The following options are supported for the EST server to authenticate the SR OS client.

  1. Client certificate authentication is achieved by configuring the config>system>security>tls>cert-profile name parameter in the config>system>secruity>tls>client-tls-profile context which is referenced in the EST profile.
  2. HTTP authentication is achieved by configuring the config>system>security>pki>est-profile>http-auth command. This option requires configuring the config>system>security>tls>client-tls-profile>trust-anchor-profile name parameter referenced in the EST profile.
  3. No authentication is performed if neither of the preceding options is configured.